►
From YouTube: TokenScript Weekly Meeting 20200528
Description
00:47:58 Tore Frederiksen: https://asn1tools.readthedocs.io/en/latest/
B
A
A
A
B
B
Bullying,
yes
or
no,
no
I
would
say
like
if
you
validate
it.
It
says
like
this:
is
this
encoding?
If
you
give
it
an
encoding
and
a
module?
It
says
this
encoding.
It's
this
module,
we're
passing
means
it.
It
takes
like
the
pure
binary
data,
and
you
know
it
follows
the
TAS
at
one
moons
to
extract
the
information
within
it.
A
B
So
so
so
so
so
the
way
I
see
it
as
I
mean
like
in
this
case.
Okay
yeah,
you
can
do
you
can
just
as
you
test
you
can
do
everything
server-side,
you
send
you
some
one
module
and
you
sent
the
encoding
to
the
server
the
server
many
dates
and
passes
this
into
a
JSON
which
you're
sent
back
back
to
the.
They
happened
that
the
app
passes,
the
JSON
into
whatever
object,
structure,
there's,
and
so
so
what
I?
B
If
you
first
have
to
send
it
to
the
server,
then
you
have
to
wait
for
the
server
to
to
compile
it
to
pass
it
to
validate
it
and
convert
it
into
JSON
and
so
the
back.
And
then
the
app
has
to
pass
the
JSON
into
an
object
structure
and
then
do
its
thing.
It
might
not
be
that
much
of
a
difference
but
yeah.
B
A
B
A
B
A
C
B
What
exactly
will
happen
like
which
bad
things
will
happen
if
it's
not
if
the
module
is
not
if
it's
not
what,
if
the,
if
the
a
is
and
one
encoding,
is
not
validated
against
the
module,
and
we
simply
assume
it
is
it's
it's
correct,
like
I
mean
it
will
show
up
I
guess
at
some
point
at
some
time,
but
the
question
is:
will
that
be
allowed?
Will
it
be
an
error
can
handle
at
that
time
always
is
essential
to
actually
validate
that
infants
are
predefined,
much
module
structure.
A
B
My
question,
my
question
is
I,
mean,
is
possible
to
simply
pass
whatever
I
di
di
encoding
this
on
on
using
open,
SSL
or
bouncing
castle.
But
what
we
don't
know
is
whether
this
passing
it's
a
pre-specified
motto.
So,
like
I
mean
you
get
the
values,
but
you
don't
know
is
the
field.
If
the
structure
of
the
module
is
the
same
as
in
ice
has
been
been
specified
in
the
years
and
one
module
yeah.
B
B
B
Okay,
I
see
what
you're
saying
yeah
I
mean
you
had
the
freedom
of
basically
saying
if
you
already
knew
what
the
structure,
if
you
do
like
the
the
ticket
dump,
is
the
fourth
element
in
the
structure,
but
that
needs
to
come
in
yeah,
yeah,
yeah
I,
think
you
know,
I
I
see
the
problem.
I
see
what
you
say,
I
see
what
you're
saying
yeah.
A
A
So
if
you
have
a
defined
that
object,
then
automatically
a
attestation
is
defined
for
you.
You
know
the
data
structure
for
that
station
and
the
hostages,
signing
request
is
also
defined,
which
is
not
used
for
in
the
figure
a
ticket
but
is
used
for
in
the
email
and
if
our
test
station,
so
the
point
being
that
the
author
only
need
to
define
that
object
and
we
complete
the
rest.
That's
us
that's
the
first
point.
A
A
D
A
A
Is
actually
the
code
in
actually
assigned
by
the
token
each
year?
So
let's
say
yes,
I'd
say
donate
three
died
and
the
click
yes.
And
now
you
get
an
action
to
delivery,
guys
that
action
is
written
by
the
by
people,
not
by
the
what's.
True
he's
asked
you
to
donate
five
dollars
and
in
the
card
opens,
the
code
in
a
card
is
signed
by
them.
I
died
project
and
the
result
is
a
transaction
or
assigned
a
message
both
of
them
assigned
about
user.
C
A
A
That's
because
of
trust
boundary,
so
the
idea
is,
if
you,
if
you
spend
three
dice,
you
probably
would
allow
some
JavaScript
and
message
our
transaction
on
your
behalf.
If
that
generous
could
be
also
coming
from
the
dying
people.
If
it
comes
from
Wikipedia,
you
might
be
concerned
that
the
the
Wikipedia
might
ask
you.
The
world
tour.
Iii
died,
you
click.
Yes,
it
actually
signs
a
message
of
all
of
your
diets,
which
is
3
million,
guys
pass
them
all
through
if
they're,
actually
they're,
not
only
dead.
The
same
message
also
send
all
the
ether
to
them.
C
A
So
let's
say
you
have
a
car
company,
let's
say
karma
capital,
which
represents
your
ownership,
and
then
you
can
authorize
usage
of
that
car.
And
then
you
have
an
action
called
authorized.
Users
which
sends
a
transaction
that
allocates
users
to
a
different
address,
make
sense.
So
far.
Yes,
ok,
let's
say
you
run
the
website
called
car
next
door,
where
you
can.
C
A
Suppose
it's
not
Wikipedia.
This
is
just
to
imagine
suppose
it's
not
Wikipedia,
but
instead
you
receive
a
letter
and
called
donation
hood
anymore
at
welfare
and
then
then,
then,
maybe
that's
email
and
click
that
link
in
email.
And
you
ask
it
shows
a
lovely
story
of
older
dog
how
a
dog
was
rescued
and
then
ask
you
to
donate
$3,
then
3
dies.
Then
the
thing
is
when
it
pops
pops
a
black.
A
C
C
Presumably,
this
is
something
that
we
have
to
ask
the
die
people
to
set
up,
because
it's
not
something
that
exists
at
the
moment.
No.
A
Such
usage
will
be
more
common.
Let's
give
you
an
example
of
pattern
card
right,
so
Parrikar,
let's
say,
has
a
film
that
says
that
if
you
spend
$1000
in
high
March,
you
will
be
given
the
golden
medal,
which
allows
you
some
privileges.
This
is
indeed
this
is
so
that
the
entities
who
are
usually
recently
rewarded
of
the
newly
minted
Patrick
Owen.
We
will
not
keep
keep
the
money
in
the
wallet
but
spend
them.
Let's
say
para:
para
card:
has
this
purpose?
They
want
you
evil
to
spend
money
in
a
month.
A
Found
to
be
spent
by
the
users
by
the
recipients
not
instead
of
being
kept
in
the
neurotic
otherwise
economy,
para
cada
must
move
the
economy
to
so
they
have
this
room
worth
it
and
at
the
end
of
the
month,
you
receive
a
notification
saying
that
you
have
spent
nine
hundred
dollars
and
fifty
and
you
only
need
to
spend
fifty
dollars
in
order
to
get
go
to
meadow,
which,
which
will
be
equivalent
to
a
Halloween
purse,
and
this
last
day.
So
you
want
to
spend
$50
so
just
go
to
some
places
like
and
diaper
delivery.
A
Oh,
cocoa
coffee
just
go
to
a
website,
and
they
want
to
spend
that
$50.
Now.
Remember
that
this
is
the
case
where
buttercup
has
the
intention
what
to
do
with
the
cocaine,
so
they
might
pop
up
a
card
and
ask
you
to
put
$50
there
and
then
it
will
give
you
play
some
music.
Give
you
the
golden
meadow
right
on
the
spot,
so
that
you
know
once
this
transaction
is
finalized,
you
will
get
the
golden
meadow.
That
would
be
some
code
that
they
want
to
put
into
total
script,
because
in
this
case
the
transfer
function.
C
I'm
just
concerned
that-
and
this
mechanism
might
be-
might
introduce
some
extra
friction.
That's
all
like
an
because
the
problem
is
you
he
presumably
you're
going
to
have
to
vet
each
one
of
these
on
transfer
requests
some
either.
Some
kind
of
process
website
will
automatically
vet
small-scale
ones,
but
I'm
just
concerned
that
yeah.
This
is
introducing
some
development.
Friction
yeah.
Unless
it's
handled
very
well.
C
So,
let's
say:
I'm
a
coffee
site
and
I'm
I'm,
basically
making
a
sort
of
a
thing
so
that
you
can
buy
coffee
for
three
died
and
I.
Have
that
request
and
now
I
realized?
Oh
I've
got
to
get
it
signed
by
the
died
people
so
I'm
they
say:
I
haven't
event
happening
tomorrow,
died,
people
I
have
to
be
sure
the
die.
People
again
are
going
to
see
my
request
and
sign
it
for
the
event
that
I
have
tomorrow.
Otherwise,
it's
going
to
be
an
unsigned.
The
question.
C
Okay,
so
basically
it's
a
variable.
You
have
a
variable
amount,
don't
need
to
the
situation.
D
Tenant
worried
in
a
different
way,
and
we
we
can
correct
me
if
I'm
wrong,
I
I,
think
you're
saying
that
the
die
people,
the
only
sign
a
token
script
file
which
describes
their
their
own
smart
contract,
not
the
coffee
shops,
I
think
that's
what
James
is
asking
him
he's
saying
that
they
shouldn't
be
made
to
sign
token
script.
Rather,
that
is
based
on
the
coffee
shops.
C
Okay,
so
basically
there's
so
they're
signing
the
died.
People's
attestation
yeah,
okay,
I,
don't
mean
okay,
the.
C
C
So
basically
I'm
I
have
my
so
each
coffee
is
three
died
and
I
have
plugged
in
the
died
foundations,
transfer,
Tokyo's
great
request
so
that
the
person
who
is
signing
can
see
that
it's
from
the
duck
that
they
actual
the
the
lower
level
transaction
request
is
from
died.
People
so
I
know
it's
only
transfer
and
died.
A
A
Bullet,
yes,
whatever
you
said
so
far,
is
correct.
Did
you
finish?
Yes,
okay,
you
finished,
okay,
all
right,
so
we
just
just
recap:
what
is
a
card
and
how
is
this
supposed
to
be
used
on
the
web
as
well
as
the
second
story,
where
the
card
I'm
use
on
web
is
the
web
requests
certain
proof
and
the
the
card
is
able
to
generate
that,
for
example,
you
wanna
generate
zero
knowledge,
proof
or
some
kind
of
knowledge,
most
proof
that
you
are
not
a
citizen
of
you.
You
are
not
US
citizen,
then.
A
Maybe
what
you
do
is
you.
You
have
a
identical
test
station
and
then
you
provide
some
proof
and
then
or
maybe
you
work
side.
That's
I
check
your
age
and
checks
your
age
before
offer
you
two
alcohol
for
sale.
Then
you
want
to
prove
your
age
without
remedial
stuff,
so
that's
the
other
way
that
the
current
might
open.
So
in
this
case,
it's
not
open
the
food
for
creative
sign
the
message
but
open
the
creative
proof
of
some
sort.
B
A
Is
the
first
square?
This
is
the
place
where
the
user
visited
website
and
that
website
has
the
token
script
for
email,
SMS,
identifier
and
identifier
to
the
school.
So
in
the
beginning,
we
might
not
do
this.
We
simply
put
all
the
focus
to
be
in
ripple,
so
it's
equivalent
to
have
honey,
loose
women
ripple.
If
you,
if
you
feel
this
is
them
probably.
A
A
So
now
the
website
required
some
something
signed
by
the
user.
The
website
next
step
is
a
do
the
stupid
thing
that
asking
you
which
one
of
the
four
pictures
has
the
best
image
not
for
which
one
of
the
nine
pictures
has
a
person
at
all
which
one
of
nine
pictures
have
them
airplane
image,
and
then
it
will
ask
you
a
user
to
type
the
verification
code
sent
to
the
mobile
phone
on
email
address.
A
Now,
if
you
pass
the
code,
the
e-mail
verification
code
and
SMS
code
test,
then
the
website
is
able
to
offer
you
that
has
stations
of
download,
which
is
a
big
download
button.
And
if
you
hit
that
button,
you
got
a
new
attestation
which
is
like
a
token
for
you,
and
then
you
can
save
that
attestation
to
move
on
Warnock.
A
Of
course,
this
anti
station
has
a
preview.
You
know
the
James
Brown
you
what
you've
really
made
it?
Okay,
it's
good
viewers,
something
like
this,
so
the
user
can
see
what
is
the
test
nation
before
downloading
so
here
the
process
of
forgetting
the
gas
station
from
the
testers
website
is
done
now,
let's
suppose
the
user
is
asking,
ask
you
not
for
what
a
question
and
not
for
what
is
website
and
that
one
requires
the
user
to
have
verified
email
address.
So
the
website
displays
the
field
say.
A
A
So
what
you
do
is
you
hit
a
button
and
then
the
mobile
phone
will
pop
up
the
attestation
about
your
email
address
and
you
select
that
and
the
select
send
and
that
the
test
is
sent
to
the
website
and
the
background.
There
are
some
challenge
response
variables,
indication,
but
you'll
get
idea
and
the
website
will
believe
you
have
this
email
address
without
asking
you
to
verify
a
your
coda
gate.
A
D
A
The
first
one
in
the
transition
framework,
so
this
is
the
XML
definition
for
that.
Yes,
in
the
next
module,
it's
a
little
bit
long
and
less
readable,
so
I
will
open
the
equivalent
translated
into
a
traditional
sn1
and
discuss
on
that.
So
what
it
has
is
attestation
of
a
data
object
has
the
following
that
it
has
signed
in
for
a
signature.
A
These
two
together
Sibley's
the
signature,
then
in
the
sand
info
it
has
been
a
versioning
and
the
issue
year,
name
the
validity
expiry
date,
the
subject
of
the
test
after
test
station,
which
contract
is
relevant
to-
and
this
part
is
the
part
where
it
is
customized
by
focal
script.
That
is
what
is
been
the
test
it
true
and
in
our
case
well,
was
attached
to
that
object
and
station
C
is
something
that
in
the
case
where,
if
someone
wants
to
reuse
his
existing
x.509
in
our
framework,
then
this
extension,
otherwise
that
object
so
yeah.
A
A
Yes
yeah:
this
is
automatically
generated
once
the
user
provides
them
that
object,
and
then
this
is
authentication
framework
which
contains
the
piece
of
data
structure
that
is
used
and
actually
that
has
struck
the
more
readable,
a
standard.
One
format
here,
as
the
algorithm,
the
identifier
version
number
serial
number,
how
all
the
fields
previously
use
I
defined
here.
This
is
like
utility
class
with
all
the
random
stuff
I
define
here
and
the
most
most
important
thing
is
only
the
name.
Where's
name
and
anything
else
is
not
so
important.
A
A
You
sent
the
test
sessions
for
them
the
server
running
on
the
server
and
get
a
decent
back,
which
will
already
contain
the
information
of
that
object,
as
well
as
if
the
test
issue
is
valid
and
leaving
out
all
the
tests.
Additional
fields
yeah
that
is
not
relevant.
The
information
framework
is
probably
where
name
is
defined
yeah.
This
is
the
only
thing
that
is
important,
so
name
is
the
name
of
the
class
station
and
it's
used
it's
basically
a
key
manual
structure.
A
key
value
sequence
of
the
key
of
the
primary
keys
is
that
that
object.
A
And
then
my
attestation
is
that
example,
and
we
made
this
example,
you
know
in
December
November
last
November,
because
at
that
time
we
were
under
the
impression
that
we
are
going
to
prioritize
if
I
take
it
as
attestation.
Again
I
show
you
the
show
you
the
S
and
not
one
sorry
that
one
module
which
is
easier
to
read
here.
B
A
A
This
is
the
same
thing
we
used
to
discuss
attestation
in
the
one
back
now.
I
should
create
another
one
for
the
unit
and
an
identifier
yeah.
So
this
is
called
a
one-time
one
level
for
the
data
structure.
I
didn't
have
the
file
for
the
signing
request,
which
I
simply
hadn't
for
being
a
bush
produced
before
this
meeting,
but
having
that
we
should
have
had
all
the
battles
that
have
structures
available.
That
would
next
thing
needs
to
do
is
just
apply
the
club
library
to
it.
A
D
D
A
A
D
A
A
Being
frustrated
that
user
leaked
their
password
from
time
to
time,
starting
to
also
offer
user
attestation
sorry
certificates
instead
of
username
passwords.
So
if
you
go
to
such
website
and
instead
of
a
username
password
login
box,
you
only
have
one
single
button:
common
login
and
if
you
click
that
button
you
can,
you
can
choose
a
certificate
login
website
and
we
are
compatible
kind
of
with
that
kind
knowledge,
because
the
destination
will
generate
a
space
s59,
just
like
their
their
certificates.
Let
me
find
a
picture
of
that.
A
D
A
I
used
to
have
a
squish
out
to
show
how
you
school
before
TopGun
script,
because
before
token
script,
it
was
RFC
the
reason
being.
At
that
time,
people
believe
that
there's
only
a
few
certificates,
mostly
they
are
such
a
for
certifying
the
users
ability.
So
if
you
can
be
fine,
because
it's
a
file
and
a
finite
number
of
things,
you
wanna
you
want
to
certify.
A
Therefore
they
define
them
fix
them
in
currency,
so
the
website
simply
knows
without
you,
somebody
writing
for
the
script,
works
and
web
said
simply
knows
what
kind
of
sign
sign
of
that
object.
They
are
going
to
get.
They
have
a
pretty
good
idea
of
that
and
the
user
will
when
they
offer
to
restore
their
certificate
into
their
browser.
The
browser
knows
what
the
certificate
should
be
like.
That
was
the
good
good
old
nineties.
A
It
was
proven
to
be
a
failure,
because
people
love
to
use
passwords,
but
at
that
time
there
was
no
such
concept
called
the
wallet
security
device.
Now
we
do
have
that.
So
maybe
we
can
revive
that,
but
today
is
different
than
promised
and
today
and
we
need
to
make
tokens
work
previously.
It
was
just
the
certifying
users
identity.
So
now
we
need
to
customize
customize
it
football
for
data
objects,
for
example,
if
the
user
has
a
FIFA
ticket,
then
he's
able
to
access
some
functionalities
on
the
website,
there's
not
available.
A
A
B
Was
wondering
one
more
thing
about
the
ASN
sn1
stuff,
because,
basically,
if
okay
can
we
because,
basically,
if
it's
a
it
so
a
lot
of
like
this
information
about
variable
names
and
things
like
that?
I
mean
a
general
if
it's
be
RDR
PN
code,
that
we
don't
have
that,
but
it's
kind
of
the
specification
of
say,
Jo
Xen
coatings,
that
is
like
the
JSON
encoding
or
the
xml
encoding
combination.
One
that'll
actually
includes
these.
B
A
B
B
Because
I
think
like
this,
this
thing
called
asn.1.
2
ohms
allows
it's
a
it's
a
Patel.
You
know
the
Python.
The
Python
thing
basically
allows
to
to
to
to
to
to
to
to
discrete
encoding
formats
such
that,
like
you
can
give
it
a
be
on
coding,
ananias
and
one,
and
then
it
returns
it
in
JR
or
or
something
like
that.
I
only.
A
A
B
A
B
B
A
B
A
B
I've
only
used
it
like
two
makes
more
command
line,
command
line
tools,
I
haven't
actually
done
any
proper
coding
or
just
like,
since
the
neverland
scripting
I.
Always
just
you
made
a
made
like
a
straight
line,
Python
program
that
just
called
everything
at
the
convent
license.
That
was
how
was
the
fastest.
B
B
C
B
The
the
sender
listen
the
being
able
to
learn
the
secret
in
the
future
I
just
assumed
it
was
something
we
discussed
that
we
might
not
have,
but
anyway.
My
question
is
that
basically,
the
disk
can
be
handled
with,
like
very,
very
simple,
zero
knowledge
proof
that
you
know
the
exponent
instead
of
actually
leaking
the
exponent
on
the
blockchain
mm-hmm,
but
I'm
a
bit
unsure
about
what
handles
we
actually
have
efficiently
any
etherium.
B
Because
it
seems
like
what
we
were
already
doing
is
that
we
were
already
doing
is
to
do
an
expense
initiation
or
like
a
point
of
education.
If
we
consider
this
something
on
an
elliptic
curve
and
and
basically
like
this,
this
you
know
is
proof
is
more
or
less
it's
more
or
less
the
same.
It's
a
it's
two!
It's
instead,
two
x
pronunciations
and
one
multiplication,
and
that's
basically
it
and
then
then
X
is
completely
hidden.
B
It's
not
but
I
just
kept
thinking
like
with
this
like
exactly
which
handles
we
have
to
efficiently
do
because
as
fasten
remember
but
something
you
know
more
standard
like
if
you
just
do
an
easy
PSAC,
which
I
mean
that
that
you
have
like
a
handle
for,
but
any
kind
of
operations
in
the
group
of
which
ECDSA
works
or
something
like
that.
I'm,
not
sure.
A
That
sound,
that's
Michael,
we
might
have
to
dive
into
the
bytecode,
but
I'm
concerned
that
then
the
way
with
Alex
develops
in
since
is
is
is
probably
only
providing
in
signing,
for
example,
and
even.