►
From YouTube: TokenScript Weekly Meeting 20200521
Description
No description was provided for this meeting.
If this is YOUR meeting, an easy way to fix this is to add a description to your video, wherever mtngs.io found it (probably YouTube).
B
B
It
so
I
will.
This
is
what
I
wrote
wrote
from
memory.
So
basically
everything
is
holy.
They
actually
originated
from
the
core
from
the
event
and
if
it
is
from
a
call,
then
notification
service
is
not
any
help.
If
it's
family
event,
then
notification
service
may
be
of
some
help,
because
the
events
have
the
contain
desks
for
the
for
the
occurs.
A
B
B
That's
there's
something
as
to
hear
from
now,
because
we
will
have
all
of
you
when
the
test
ish
is
added
into
the
matrix
okay
for
now,
I,
don't
I,
don't
really
mind
which
one
to
use,
and
so
everything
is
in
P
together
then
I
can
form
my
opinion.
So
this
is
good.
So
if
the
electrical
has
two
values
at
work
regions
where
the
event
had
to
call
the.
B
B
B
C
Arriving
back
I'm,
sorry,
yeah
yeah,
the.
B
Stitches
a
bit
complicated
because
the
engine
such
as
for
event
after
the
core,
meaning
that
the
energy
is
going
to
look
for
the
remember
the
time
of
the
cord,
the
black
block
height
at
the
core
and
then
next
time.
It
will
search
for
the
for
the
event
between
that
time
and
the
current
time.
And
then
it
will
replace
the
the
caged
core
value
with
the
kitchen
event.
Instead,.
A
C
B
You
cannot,
for
example,
if
there's
oral
code
that
returns
the
current
interim
price
and
that
is
being
used
in
attribute
as
a
hundred
tokens.
In
theory,
you
should
only
get
the
event
once
and
now,
because
it's
separate
attribute
you
have
to
go
through
everyone,
everyone,
it's
just
the
relationship
that
happens
concept
like
control
beauty
to
the.
If
we
design
a
variety,
you
should
only
fetch
the
attributes
for
the
entire
set
of
token
scripts
once
if
the
event
is
used
cross.
B
B
B
B
So
which
I
agreed,
the
fan
of
the
vision
will
be
would
take
attestation
for
original,
and
then
we
have
an
overview
at
that
time.
So
this
is
so
far
thinking
draft
not
even
inspect
draft
spec
but
I
think
in
draft.
Then
this
is
what
soon
you
used
to
like
to
cost
Roman,
but
I
think
that
word
is
abused
in
the
corporate
environment
anyway.
B
B
But
before
before
we
do
we
do
that,
we
do
it.
We
work
in
parallel
universe,
that
on
the
one
side
there
are
events
and
the
course
and
the
other
there
are
test
issues,
and
then
we
will
try
to
marriage
to
learn
two
words
that
might
make
things
easier.
So
what
you
are
looking
at
right
now
is
the
test.
Asian
identity
attestation,
identifier,
attestation
used
in
the
send
ether
to
identify
your
protocol.
So
let's
first
look
at
the
product:
okay,.
B
Yeah
I
think
this:
is
it
actually
yeah?
This
is
the
protocol.
So
last
time
we
discussed
that
protocol
and
we
improved
based
on
it
and
later
I
rewrote
the
protocol
with
the
improvement
and
already
in
there.
So
there's
only
one
version
now
and
then
make
this
shape
or
screen
just
big
enough.
So
you
can
see
the
entire
protocol:
okay,
yeah,
okay,
so
that
means
I
need
to
stop
share,
share,
share
game.
B
E
B
E
E
B
B
So
the
reason
that
I
make
it
independent
is
because,
for
example,
if
you
do
secret
sharing
or
if
you
try
to
log
into
a
website-
and
you
want
a
few
in
there-
are
your
email
address.
As
you
know,
subscribe
mayo,
let
the
newsletter.
Then
the
website
can
use
attestation
instead
of
asking
you
to
receive
a
verification
code-
and
this
might
happen
have
happened
before
and
it's
ever
sent
the
check.
E
D
B
B
B
Core
part
of
the
test
session
is
the
object
or
I
probably
should
code
a
tested,
but
because
the
object
is
shared
between
attestation
and
a
certain
blockchain
event
that
also
to
test
it
otherwise
great
idea,
so
that
object
is
the
core
part
and
enclosing
the
data.
Object
is
to
be
signed.
The
information
which
include,
for
example,
the
public
key
and
to
be
signed
information,
is
where
what
is
it?
Look
like?
Okay,
let
me
find
it
so
go
to
community
website.
Let's
look
at
it.
D
E
B
B
B
Now,
okay,
so
that's
that's!
That's
what
we
had
last
November.
So
let's
look
at
this
one
for
this
to
work.
Bob
has
to
create
a
so
I,
create
a
ether
McKee
which
is
already
there
and
it's
not
part
of
the
test
ation,
and
then
he
will
have
this
corresponding
subject
of
the
attestation.
Subject
is
here
and
the
word.
C
B
B
B
B
B
B
E
B
The
that
object
to
be
attested
and
the-
and
this
is
the
module
of
it.
B
Okay,
this
is
module
of
it,
and
this
is
the
instance
which
is
used
in
that
head
station,
which
basically
say
you
have
attestation
to
be
stored
and
the
users
wallet
who's
that
object
is
model,
is
modeled
after
this
module
and
the
rest
of
the
bit
likes
and
info
and
test
station
I
implied.
So
the
word
that
tested
Sookie
implies
everything
because
we
standardized
how
how
to
put
send
in
from
there
and
how
to
put
the
entire
test
age
in
there.
So
we
might
have
other
fields
like
like
in
this
case.
B
B
B
B
B
Okay,
so
I
will
not
go
into
the
detail
of
publicly
in
for
how
how
it
is
defined.
Just
imagine
this
be
in
the
format
for
containing
private
keys,
so
this
would
be
attestation
the
definition
of
that
station
and
so
far
so
good
yeah.
This
is
this
is
what
I
want
to
share
with
you.
So
if
you
guys
look
at
this
and
think
it
is
possible,
then
we
will
move
on
to
talk
about
what
is
inside
private
key
info,
which
is
not
really
taken
topic.
The
big
topic
is
just
the
test
issue
here.
B
C
It
seems
like
this
is
something
that
there
might
be
a
wizard
to
help
a.m.
help.
Someone
generate
this
attestation.
B
B
What
is
there
in
it
and
any
hotel
who
is
able
to
offer
your
room,
provide
that
there
are
three
star
hotel
in
Perry
in
Paris
is
able
to
send
a
transaction
to
a
smart
contract
and
redeemed
and
take
the
money
in
exchange
for
hotel
voucher,
which
should
be
stable
night
with
let's
say
it's
the
other
case,
the
guy
who
designs
the
protocol,
which
says
the
hotel
needs
to
provide
attestation
such
as
they
are
three-star
and
such
as
stuff,
we'll
need
to
write
some
something
like
this
he
need
to.
He
will
here.
B
We
need
to
write
in
this
section.
What
is
to
be
attested,
for
example,
hotel
level,
stuff
yeah.
This
would
be
the
hotel
attestation.
It
might
be
more
complicated
like
what
the
location
of
the
hotel,
whether
or
not
is
three-star
it
would
be
embedded
in
the
sequence
bits
and
what
he
has
done,
that
the
other
is
relatively
standard.
You
define
attestation
that
attests
to
this.
B
B
B
Be
omitted
because
in
many
cases
the
security
is
a
private
key,
so
it's
implied.
So
if
you
say
that
you
have
a
secret,
then
it's
automatically
using
line
9
to
define
what
is
in
the
secret.
What
is
the
format
of
that
secret
unless
you
have
special
format
secret,
which
can
happen
if
you
have
strange
protocol
or
any
way.
C
And
so
on,
when
you
stop,
when
you
populate
this,
like
an
example
population,
you
actually
put
the
the
data
object
would
go
inside
the
tested.
This.
C
B
Let's
say,
for
example,
Paul
wrote
a
magic
link
remember
a
while
ago
magic
link
which
has
attestation
in
it
right.
So,
if
you,
if
you
click
a
magic
link,
then
the
engine
will
take
the
data
object
from
the
actually,
it
would
be
attestation
in
it.
You
ho
taking
the
test
nation
from
the
magic
link
and
then
storing
the
users
say
computer.
B
C
B
B
So,
for
example,
this
one
doesn't
say
what
you
can
do
with
the
test
station
right,
so
that
is
going
to
be
in
the
card.
This
is
just
a
test
station.
If
you
have
such
an
a
station,
you
might
have
a
few
actions,
for
example,
prolong
this
renew
this
attestation
use
this
attestation
to
cash
out
a
check
that
would
be
the
action.
I
guess.
B
Yeah,
so
this
is
like
local
script
with
only
attribute
definition
and
the
event.
Definitely
the
model
Hammad
you
used
that
are
which
objects
used
for
events,
but
nothing
else,
no
cards
anything
just
to
make
simple.
So
the
working
part
of
this
file
is
only
these
lines,
the
13
to
22
and
this
line
effectively,
and
actually
these
two
lines.
B
B
B
B
Just
a
very
early
draft,
yes-
and
you
understand
every
part,
the
purpose
of
every
part
right,
yes,
I,
think
so:
okay,
okay,
oh
good!
So
about
parsing
such
attestation.
Let's
say
yours
receive
and
150
bytes
of
data,
and
they
want
to
pass
it
and
store
it.
That
is
down
through
the
implementation
of
how
to
pass
on
his
station
or
how
to
even
construct
one
if
the,
if
the
destination
is
defined,
to
be
allowing
user
to
construct.
Is
it's
largely
down
with
whether
s.
D
B
In
dot
one
library
and
not
to
be
actually
coded
by
ourselves,
so
I
will
go
through
the
example
to
explain
how
this
process
is
done.
I
don't
have
an
example
for
for
very
that
object
should
be
defined
here,
but
I
have
an
example
for
something
similar,
which
is
the
private
key
info.
So
let
me
turn
this
off
and
let's
look
at
priority
info
and
share
screen.
B
Okay,
so
this
is
proper
cleaning
for
its
pretty
long
sorry,
this
one.
This
is
probably
cleaning
for
it.
It's
pretty
long,
but
you
don't
have
to
be
concerned
with
it,
because
it's
it's
just
RFC
it's
RFC,
written
in
in
XML
language
and
basically
defines
like
and
how
to
declare
a
private
key.
What
is
the
parameter
of
the
private
key?
B
This
chunk
of
data
under
standard
schema
and
then
correctly
interpret
egg,
come
in
private
key
or
store
privately
correctly.
Now.
Imagine
this
being
a
a
that
object,
because
this
is
this
is
a
RF
say
this
is
a
product
came
for.
This
is
shared
between
all
of
the
stations,
every
one
of
them
as
long
as
the
involvement
secret,
but
imagine
this,
instead
of
being
being
the
private
key
for
it
module
it
is,
you
can
see
it,
it
starts
with
the
same
thing
start
with
module
and
it
starts
with
sequins
and
stuff.
B
B
Imagine
this
is
been
the
data
bin
of
being
a
tested,
the
the
object.
Then
it
would
be
translated
into
something
like
this
in
terms
of
format
where,
instead
of
version
2c,
your
ticket
number
netiquette
class
therefore
fed
into
a
library
which
is
able
to
generate
or
interpret
eight
interpret
such
a
pinnable
binary,
binary
blob
of
data.
B
This
is
at
me
explaining
the
process:
it's
not
the
decoding.
What
we
have
to
do,
because
the
translation
is
but
by
another
library
and
the
understanding
of
the
data
object
the
password
to
pass
the
binary
that
the
object
or
construct
one
is
from
another
library,
which
is
what
I
am
working
with
toad
to
evaluate
like
a
witch
library
use.
A
B
What
we
do
is
just
to
evaluate
the
existing
libraries
with
what
was
the
quality
of
them
and
then
write
a
translator,
translator
connected
to
library
component,
so
that,
if
you
define
the
data
object
here
to
be
a
test
date,
for
example,
then
the
library
is
able
to
swallow
the
blob
of
that
hub
and
the
test
case
will
be
swallow.
The
blob
of
data
that
comes
with
the
magic
link,
because
that's
the
simplest,
because
there's
not
not
swallow
swallowing
a
blob
of
data
from
the
website
or
email
or
smart
contract.
B
It's
just
a
link
which
has
manner
data
in
it
and
in
the
grid.
For
the
tokens
could
author,
he
needs
to
define
what
he
is
in
the
test:
ation
like
a
numeral
owner
and
a
class
and
starting
time
of
the
event.
If
somebody
wants
to
write,
if,
if
a
ticket
for
and
if
it
somebody
wants
to
write
a
new
ticket
like
an
Olympic
ticket
here
and
who
authorized
the
focus,
could
follow
he
ticket,
he
just
needs
to
find
his
own.
B
That
object
to
be
attested
and
then,
with
the
help
of
this
library,
is
able
to
construct
individual
tickets
as
magic
link
and
I'll
consumed
them
by
by
having
magical
sent
to
the
mobile
phone,
and
then
there
was
taken
in
into
the
cage
the
data
into
the
storage
of
mobile
phone,
of
course,
after
validation,
because
validation
is
done
by
the
same
library
which
I
understand.
What
is
that
object?
It
also
understands
how
it
is
attested.
B
D
B
So
that's
the
idea
behind
the
design.
So
far
we
have
not
touched
about
the
the
flow
of
how
to
how
could
forget
how
to
write
a
card
from
A
to
B
and
we
have
not
dealt
with
it.
We
just
look
at
data,
so
the
way
I
typically
work
is
welcome.
Data
first
before
working
on
in
the
software,
because
once
that
has
cleared
the
executable
component
is
relatively
easy
to
make.
B
B
A
B
B
B
B
B
E
B
Longer
than
twenty
56
bits,
then
it
will
store
perfectly
okay
as
an
X,
but
have
a
bad
problem
if
it
is
used
right.
Yes,
you
cannot
have
integer
larger
than
that
and
then
look
actually.
You
will
have
a
problem
halfway
down
because
because
it's
your
main
teacher
has
not
signed
but
anyway
that
if
we
have
a
theorem
type
here,
I
would
imagine
that
is
a
I.
B
A
C
B
B
If
we
say
an
other
way
to
not
overrule
a
theorem,
let's
see
the
way
the
roads
are
blocked.
Number
one
Road,
which
is
to
define
two
things.
One
is
called
name
registered
as
a
event
and
the
others
define
name
registered
as
a
testable
object,
then,
is
confusing,
because
when
we
make
a
reference,
you
don't
know
which
one
you're
referring
to
or
whether
or
not
they
all
have
the
same
fields.
B
B
B
Extendable
because
my
contract
is
going
to
outlive
some
of
the
data,
sorry
that
will
not
leave
some
of
the
smart
contracts.
You
have
to
extend
it
some
sometime
in
the
next
round.
For
example,
you
might
add
a
new
field
called
country
if
the
if
the
ticket,
if
the
fee
that
ticket
is
backcountry
or
expiring,
you
might.
B
Copy
expired,
then,
then,
you
don't
want
to
invalidate
all
the
previous
events.
When
attestation
you
can
design
a
data
format.
That
is
extendable,
but
if
you
make
it
into
program
like
in
the
theorem
waits
lazy
design
word
where
data
structure
is
actual
program,
then,
and
it's
difficult
to
to
extend
it
without
him,
Benedict
the
previous
data
or
making
a
program
who
is
able
to
access
the
previous
data
access
the
new
ones.
B
B
B
D
Not
exactly
I
mean
I
I
took
a
look
as
I
mentioned,
on
those
different
possible
solutions
for
passing.
Yes
and
yes
in
one
and
yeah
I
will
have
a
close
as
a
road.
I'll
have
a
closer
look
at
this
OSs
thing
and
see
you
see
exactly
how
it
cost
and
if
I
can
get
that
to
work
because
I
mean
it's,
it
is
it's
a
bit
bit
unorthodox
to
basically
just
receive
a
and
na
sn1
module
and
an
encoded
element
and
then
pass
it
straight
into
a
Java
program
or
iOS
program.
D
C
D
Exactly
yeah,
you
know,
I'm
gonna
have
a
look
at
that
and
see
if
I
can
find
it
and
also
try
to
I
mean
this
is
not
an
open
source
library.
Unfortunately,
it's
like
a
commercial
thing,
but
I
was
not
able
to
find
anything
that
that
actually
did
it.
I
mean
bouncy
cast
as
a
rope.
Bouncy
castle
does
a
little
bit,
but
it's
still
like
either
you're
gonna
have
a
hard
time.
Writing
a
program
that
basically
like
tries
to
use,
aren't
attached
to
the
code
and
then
like
checks.
D
If
the
user
is
free
to
define
whatever
is
in
one
module
they
want
because
then,
basically,
the
code
would
like
to
go
one
element
of
of
the
encoding
and
then
try
to
figure
out
what?
What
is
that?
What
to
do
with
that
and
I?
Don't
think.
That's
that's
a
viable
option.
I
think
the
closest
mention
is
this
OSs,
where
it
seems
you
can
so
there's
a
way
of
encoding,
asn.1
in
at
the
JSON
or
XML
and
I.
D
Think
if
we
first
have
it
in
that
some
engine,
if
we
first,
if
we
use
this
this
library
to
basically
pass
I
stand
at
the
encoding
of
asn.1
into
like
a
JSON
file,
basically
or
JSON
object,
then
we
can
then
I
think
it's
much
easier
to
just
handle
like
you
standard
JSON
tools
in
our
code
to
do
do
what
we
want.
I
guess.
D
Dad
I
don't
know
what,
if
there's
anything,
useful
to
say
or
or
whatever
it's
it's.
It's
a
bit
of
a
it's
a
bit
of
a
hard
issue
to
to.
D
D
D
Okay,
anybody
still
there.
D
D
D
I
suppose,
what's
it
called
XS
T?
Is
that
the
shade
specification
of
XML
or
something
like
that
and
then
have
the
data
itself
encoded
as
an
XML
file?
And
then
we
can
use
standard
tools
to
use,
invalidate
I
think
that
that
might
be
the
best
way
to
go,
or
rather
the
only
way
unless
we
want
to
write
them
like
some
pretty
advanced
stuff
from
scratch.
D
Basically,
most
libraries,
they
pass
the
module
specification
into
like
a
Java
object
file,
and
then
you
can
decode
and
asn.1
encoding
into
like
a
specific
Java
object
or
something
like
that.
But
that
doesn't
really
work
on
runtime
when
the
specific,
when
the
module
is
one
module
specification,
is
part
of
the
the
input
yeah.
D
B
Not
writing
a
program
that
only
handles
an
attestation
also
without
I,
mean
the
first
user
to
entrust
the
program
believe
you
that
it
only
handles
the
test.
Ation
wasn't
having
any
you
intention.
So
we
do
this
by
having
the
attestation
format
declare
able-
and
that's
not
the
typical
use
case
before
blockchain
right.
No.
D
B
D
As
I
mentioned,
like
only
thing,
I
could
find
that
that,
like
probably
do
it
is
it's
like
this
OSS
thing
and
this
planet
yeah
I
mentioned
for
doing.
This
is
probably
like
this
converting,
basically
the
N
asn.1
encoding
into
like
a
JSON
or
an
XML
file
like
in
particular.
If
it's
an
XML,
then
I
hope
there's
a
tool
to
convert
the
asn.1
encoding
into
an
X.
What's
it
XS,
T
or
X
essence,
here,
I
forgot
the
names
of
like
the
schema
specification.
D
I
mean
like
an
XML
or
JSON
file,
this
of
course
comprehendible.
But
so
the
question
is:
if
we
want
to
actually
verify
it
against
some
sort
of
some
sort
of
schema,
I
mean
like
one
thing
is
we
get
an
8,
we
get
this
encoding
and
then
what
comes
out
of
this
libraries
and
it's
an
XML
file
of
the
content
of
this
encoding?
And
my
question
is:
is
that
good
enough?
D
B
Yeah,
so
so
your
question
is,
and
let's
say
this
guy
DFAC:
would
he
find
it
if
he
particularly
says
that
there
are
three
classes:
zero,
two
and
one,
however,
all
that
he
defined
clearly
there
are
zero
to
one
three
classes
in
his
module.
The
library
might
still
takes
in
attestation.
That
says
the
value
is
4
yeah
yeah
check.
D
D
B
D
D
I'm,
not
that
far
mate
made
a
branch,
I
cut
out
all
the
the
pieces
and
and
things
that
were
superfluous
and
started,
adding
a
placeholder
logic
for
handling
our
specific
cases.
But
that's
the
like
a
lot
of
work
but
I
just
want
to
say,
like
we
got
like
the
fixes
in
that
I
really
really
wanted
to
get
in
before
I
made
a
branch
and
I
made
a
new,
a
new
branch
and
started
coding
it
according
to
to
to
what
we
wanna
cheat
yeah.
B
Okay,
we
much
thought
it's
like
this,
like
you
could
just
be
us
for
the
part
of
look
that
you
think
is
not
part
of
the
project
in
a
while
in
the
meanwhile
and
so
on
our
side,
and
we
had
a
meeting
that
our
internal
core
developers,
which
are
born
and
prong
through
pressures
to
be
allocated
into
a
secret
sharing.
So
we
hired
a
company.
B
Except
that
this
hand
the
CSR
is
by
our
ears
and
that
one
and
the
tests
inspire
our.
It
has
not
met
one
model,
not
the
standard
OpenSSL.
So
if
he's
just,
if
you
just
stand
there,
when
he
just
use
a
folk
ancestor
and
give
it
to
us
and
project
that
right,
so
we
won't
want
them
to
see.
If
there
is
a
variation,
then
where
will
they
be
able
to
handle
it
and
if
they
give
it
a
17,
similar
12
SSL?
But
there
isn't
one
model
we
provided.
B
Then
we
know
that
they
are
able
to
do
more
complicated
stuff.
You
think
thatÃs
a
test
yeah,
so
we're
working
with
them
for
them
to
deliver
that
test
and
we
will
see
then
we
will
I
will
try
to
bridge
connect
you
to
them.
If
they
are
successful
in
the
test,
and
then
we
do
an
outline
of
component
list
and
how
to
deliver
those.