►
From YouTube: TokenScript Weekly Meeting 20200409
Description
No description was provided for this meeting.
If this is YOUR meeting, an easy way to fix this is to add a description to your video, wherever mtngs.io found it (probably YouTube).
A
A
A
E
E
A
A
A
Okay,
so
entry
token,
let's
look
at
line
39
as
39
yeah
39
as
well,
and
there's
also
expired.
Oh
yeah,
that's
where
comma
expired
come
from
is
copied
from
from
from
from
entry
token,
but
maybe
in
common
case,
there's
no
expired
to
be
used.
So
that's
why
I
saw
used
okay,
so
the
only
working
example
will
be.
The
entry
token
observe
line
39.
A
B
A
So
I
send
a
message
to
everybody
in
the
room:
okay,
let's
look
at
X
tie
bridge
and
where
its
selection
is
at
line
50:56
in
our
selection.
There
and
line
56
56
a
get
tears,
transer,
cody,
46
46
and
you
can
see
the
selection
there
and
it
has
a
denial
message
to
parents,
not
enough
balance,
and
then
it
is
used
that
the
view
of
them.
A
Okay,
that's
because
this
selection
is
used
as
exclusion,
so
the
weight
where
we
use
it.
That's
actually
good
a
good
point.
If
you
are
confused
here,
other
people
will
be
confused
here
too.
We
might
need
a
solution
for
that,
so
the
selection
simply
define
the
selection.
That
is,
that
is
a
set
of
token
and
the
action
refer
to
it
by
in
the
in
the
header.
But
in
this
case,
because
this
is
a
action
token
script
and
we
have
we
have
we-
we
have
no
place
to
play.
To
put
it
exactly.
A
B
A
Good,
the
low
part
is
the
so
and
suppose
you
go
to
a
wooden
cabin
and
you
couldn't
open
the
door.
Then.
Typically,
there
is
a
story
going
on
there.
You
might
need
to
get
key
somewhere
or
if
it's
dark
the
sanctuary,
then
you
need
to
get
the
the
code.
For
that.
You
need
to
answer
three
questions,
which
is
when
it
was
the
music
of
life.
What's
life
is
greatest
in
this
was
life's
greatest
illusion,
stuff
and
yes,
that's
a
plot.
That's
part
of
the
thing
that
you
it's
discoverable
its
intended
that
you
discover
a
door.
A
You
cannot
open.
Sometimes
I
started
way
around
that
then
let's
say:
there's
food,
there's,
there's
a
trace,
there's
no
path,
but
if
you
install
download
DLC,
then
just
path
opening
for
you,
so
in
that
case
and
the
option
is
intentionally
hidden
right
so
because
it's
not
part
of
the
plot,
because
there's
no
plot-
and
you
have
done
unless
you
have
done
like
downloaded
DLC.
So
when
is
kind
of
denial
that
is
intended
to
be
discovered
and
the
other
is
the
denial
that
is
not
intend
to
be
discovered
now
making
letting
this
to
real
life.
A
Token
scripts
story:
if
you
have
a
ticket,
but
ticket
has
expired
or
if
you
have
a
certain
die.
But
you
cannot
transfer
to
X
time
because
your
balance
is
below
the
minimum
transferable
amount.
Then
this
is
for
some
time
something
to
be
discovered.
The
user
will
feel
nervous
if
they
cannot
see
the
option
of
converting
diet
or
exile
or
entering
the
venue
for
with
the
expired
ticket.
They
would
prefer
to
have
that
button
there
and
click
that
button
and
get
to
know
that
they
are
not.
A
So
there
is
a
difference
where
you
want
to
hit
the
option
or
you
want
to
make
it
read,
is
able
now
the
boat.
Both
situation
exists.
So
how
do
we?
How
do
we
design
it
in
token
script?
I
have
a
very
simple
rudimentary
design
idea
and
that
I
won't
discuss
with
you.
That
is
an
and
for
every
action
there
are
two
attributes
one
is
exclude
and
the
other
is
available
to
exclude
refer
to
a
selection
available
to
refer
to
a
selection.
As
well
and
accept
that,
if
you.
A
A
Oh,
that
doesn't
that
is
not
where
the
difference
is.
The
the
difference
I
want
to
highlight
is
whether
or
not
the
selection
is
used
as
the
value
for
exclude,
or
is
it
used
for
the
value
of
available
to
both
exclude
and
available
to
our
abuse
of
action?
Now,
coming
back
to
your
message,
you're
saying
about
denial:
that
is
simply
an
implementation
thing
that
if
you,
if
you,
if
you
define
the
message
for
denial
and
then
the
selection
is
used
for
as
a
value
for
exclusion
or
exclude,
then
the
team
at
denial
message
is
displayed.
E
C
E
E
A
C
C
A
E
Yeah
or
reassign,
although
I,
think
your
your
Darwin's
be
a
better
one
where
I'm
only
the
admin
person
has
a
has
rights
to
begin
a
vote.
Yeah.
A
A
D
E
C
A
A
symmetry,
that's
an
included
next
I
know
I
know,
but
the
user
would
the
the
developer
will
think
that
actually
this
is
combination,
so
I
can
use,
exclude
and
include
both,
and
why
not,
then,
which
one
is
stronger
and
no
idea?
Yes,
so
so
I
don't
want
them
to
think
about
means.
I
want
them
to
make
only
one
choice:
it's
like
nothing
but.
E
A
C
C
A
A
A
Okay,
yeah
so
I
remove
both
okay,
that's
going
to
be
a
breaking
change
and
so
I'm
thinking
about
implementing
this
in
this
schema,
which
means
break
I'm
doing
the
iOS.
If
you
hate
me
for
that,
I
probably
will
consider
and
move
it
to
next
schema,
but
such
breaking
changes
I
want
to
do
them.
Early
seems
like
a
minor
change
yep.
D
D
A
A
So
so
that's
it,
and
so
next
topic
is
toast
topic,
and
so
thank
you
very
much,
though,
for
providing
hello
there.
Yes,
ok,
nice,
nice,
and
so
so
the
topic
is
and
how
do
we
start
from
there?
So
we
mentioned
that
pesto.
First,
press
o
doesn't
have
a
policy
manager
and
it's
supposed
to
be
embedded
in
another
system
with
pod
policy
manager.
Do
you
have
in
any
like
a
model
in
mind?
What
software
is
our
policy
manager
or
is
it
not
considered,
and
we
just
have
to
come
up
with
something.
G
A
A
A
D
A
If
that
is
has
policy
we
might
because
we
would
have
fresh
knowledge
about
how
alb
works.
We
can
combine
that
with
the
presto
pesto
and
if
not,
if
it's
Policy
Manager
is
not
very
fine,
then
we
need
to
find
something
else,
maybe
CloudFlare
or
maybe
a
java-based
one
so
that
it
can
integration
on
code
level,
therefore
yeah.
So
this
is
the
first
thing
we
check
because
we
are
lazy.
A
So
Sangala,
can
you
also
take
a
note,
but
we
need
to
check
if
the
policy
can
be
built
based
on
the
content
of
the
rest,
call
because
I
think
the
the
must-have
policy
based
on
URL,
but
in
case
of
pesto,
the
entire
thing,
both
the
name
and
user
name
password,
is
in
the
rest
of
call.
That
means
we
need
to
see
if
it
is
able
to
do
policy
based
on
the
value
inside
the
rest
of
call.
So.
D
A
Brush
up
on
that
again,
I've
kept
a
note:
okay,
nice
until
next
question
is,
and
so
basically
when
the
user
sets
up
sets
the
the
password
for
the
first
time,
the
user
will
do
three
consecutive
course.
Two
three
service
provide
services
and
they
will
do
their
own
negotiation.
Is
that
how
it
work?
I
mean.
A
A
G
It's
it's
only
known
by
the
user
and
the
server
space
eg
ends
up
with
some
some
shares
that
sort
of
loosely
based
on
the
password
and
some
some
randomness
in
a
way
where
it
can
be
verified.
Where
can
be
restored
later
on
that
makes
sense,
I
know
it's
a
bit.
It's
a
bit
abstract,
but
yeah
I
mean
that's,
that's
that's
the
core,
the
cryptography
in
it
it's
basically,
the
servers
will
never
have
anything
based
on
that
based
on
the
password
in
plain,
ok,.
G
G
So
just
so,
you
have
an
idea
like
on
an
abstract
level.
It's
basically
it's
what's
called
an
oblivious
pseudo
random
from
its
basic.
You
know,
so
you
know
a
pseudo-random
function
right.
You
take
some
some
key,
give
it
with
some
non
and
then
you
get
a
random
value
out.
So
basically,
the
idea
of
pesto
is
to
construct
a
PRF
and
function
as
a
distributed
protocol
where-where-where.
G
Basically,
what
you
give
as
input
is
the
username
and
password
and
then
and
then
the
server's
contribute
with
some
secret
key
material,
and
what
comes
out
is
is
is
a
pseudo-random
value
to
the
user.
The
user
then
uses
this
pseudo
random
value
to
generate
a
public/private
key
pair
and
makes
a
signature
on
the
nonce
to
authenticate
to
watch
the
server.
So
basically
the
idea
is
the
server.
Has
a
health
has
a
public?
Has
the
public
key
of
the
user
can
use
to
verify
with,
and
the
user
just
never
holds
the
private
key?
G
A
So
if
you
look
at
communication
channel,
the
the
user
provide
password
to
the
user
agent,
the
client
and
the
client
will
inquire
three
nodes
and
obtain
their
public
key,
and
this
can
be
done
that
can
be
attested
through
a
certificate
and
the
the
the
three
public
case
in
the
client
side.
Clans
now
have
the
knowledge
of
three
public
keys
and
one
user
password,
and
then
the
current
will
generate
two
three
pieces
of
data
using
this
and
then
yeah,
okay.
Okay,
so
that's
that's
see
that
that's
that's
good!
That's
implementable!
On
Android!
A
D
G
Mean
I
wrote
the
music
you're
sharing
is,
basically
you
can.
You
can
add
it
as
a
maven
library,
it's
just
like
it's
just
an
implementation
of
the
crypto
to
to
construct
secrets
yeah.
So,
basically
you
know
you
run
this
library
on
on
the
client
side.
You
give
it
some
input.
It
constructs
this
equation.
Then
the
client
basically
sends
this
to
the
service.
A
G
G
Yeah
I
think
I
mean
that
that's
definitely
what
what
you
do.
I
mean
he's,
not
gonna.
The
clan
is
not
gonna
hold
I
mean
the
client
is
just
you
know,
sharing
his
thing,
I
mean
he
necessarily
because
he's
the
one
who
actually
knows
the
secret
at
some
point.
So
he
is
the
one
cutting
it
up
into
using
the
software
to
cover
up
into
three
pieces
and
then
just
piggyback
it.
On
on
on
the
TLS
on
the
TLS
channel,
you
have
established
with
the
server
after
authentication.
A
A
A
G
Basically,
what
you
will
probably
do
is
mean
you
know.
The
client
has
a
certificate
of
of
the
server,
so
it
can,
just
you
know,
can
send
an
encrypted
message
and
it
can
use.
Basically,
it's
signing
key
from
pesto
to
just
sign
whatever
secrets.
Yes,
it
gets
so
the
servers
know
that
it's
the
right,
authentic
client
that
does
this
and
I
mean.
G
A
A
G
Want
to
do
that
I
mean
because
we
only
have.
We
only
have
one
thing
we
want
to
do
with
the
service
right.
We
wanna
we
wanna
offensive
pate.
We
want
to
check
the
user
ID,
the
user
knows
the
password,
and
then
we
have
the
registration
where
the
user
supplies
the
secret
key,
the
secret
chess
or
all
we
have
all
we
have.
G
We
have
the
the
reconstruction
where
the
servers
where
the
server
sends
this
years
back,
right
and
I
would
just
I
mean
I
would
just
use
the
I
would
just
use
the
the
the
the
the
TLS
channel
already
in
place
to
do
after
after
authentication
to
do
this
kind
of
to
do
this
kind
of
communication
between
the
client
and
the
servers.
Okay,
so.
A
G
A
Sorry,
and
did
you
say
yes
to
all
three
questions,
because
my
line
just
dropped
and
reconnected?
Yes,
okay,
so
that
so
now
I
got
it
then
understanding
is.
We
can
create
three
shares
on
the
mobile
phone.
We
can
pass
these
three
shares,
as
is
to
three
nodes,
no
calculation
needed
at
this
stage.
They
just
need
to
keep
them.
You.
G
A
A
A
So,
okay,
so
so
let
me
try
and
not
be
precise.
It's
my
fault
so
now.
I
understand
that
the
currency
I
understand
it
is
when
pesto
is
working
and
every
node
has
to
have
a
public
key
and
that
pay
public
key
is
needed
for
the
user
agent
to
generate
the
the
the
encrypted.
If
you
we
would
call
it
and
it's
password
so,
for
the
user
agent
need
public
key
to
do
some
calculation
and
that
public
key
is
not
the
same
key.
The
user.
The
user
agent
establish
secure
connection
with
the
notes.
A
A
In
case
of
pesto
is
needed
to
somehow
deliver
that
second
public
key,
which
is
used
for
calculation,
not
for
encryption
they're,
not
not
for
skew
in
general
and
in
case
of
sss,
is
not
needed
to
do
so.
Yeah
and
okay,
and
when,
when
the
with
the
three
nodes
and
in
the
pestle
case,
when
the
user
agent
acquires
the
three
public
keys
from
the
three
nodes,
and
they
simply
trust
it.
And
as
long
as
the
key
is
passed
through,
TLS.
G
A
Yeah
so
now
I
understand
how
it
works:
yeah,
yeah,
yeah,
okay.
So
so
what
we
need
to
do
is
to
to
to
take
this
and
get
the
client
working
user-agent
working
and
the
configure
could
find
out
the
if
ELP
can
be
our
policy
secure,
Policy,
Manager
and,
and
that
would
be
the
two
chunks
of
work.
Do
you
see
any
other.
A
G
G
A
There's
another
piece
of
thing:
yes,
you're
right,
so
there
are
three
piece
of
software:
one
is
that
user
agent
in
this
case
are
for
what
is
Android.
The
other
piece
of
software
is
load
software
that
runs
on
each
party
and
the
third
is
the
tooth
actress
or
an
authentication
gateway,
which
is
deployed
by
only
one
copy
by
our
four
wallet
and
the
policy
manager.
The
two-factor
authentication
thing,
as
well
as
the
three
nodes
and
the
two-factor
authentication
server,
has
to
be
written
from
scratch
because
it
keeps
all
the
same
addresses
and
their
corresponding
second
factor.
A
A
So
next
next
thing
I
wanted
to
do
is
to
write
an
a
specification
for
the
work
that
has
to
be
work
has
to
be
done
on
the
two
factor:
server
as
well
as
the
work
has
to
be
done
on
the
user
agent
and
then
like
and
and
then
you
will
have
a
look
at
that
and
if
it's
alright
I
will
probably
send
the
two
factor
servers
into
outsourcing
team.
To
do
it,
and
maybe
you
will
be
doing
the
user
agent
as
well
as
node
software-
is
that
yeah
you're,
correct.
A
A
Okay,
that's
that's
about
sounds.
It
sounds
about
right.
I.
Also
imagined
you
didn't
do
much
Android
programming,
so
maybe
it's
between
James
Brown
and
me
to
figure
out
if
we
can
already
port
the
client-side
code
to
Android
and
just
give
a
give
us
a
feeling
of
how
much
work
is
ahead
of
us.
You
know
as
experimental
port
yeah.
F
A
F
A
F
G
G
A
C
G
A
A
G
A
A
Has
a
few
columns
or
every
key
has
a
table:
every
key
has
a
few
columns,
that's
it
yeah
that
should
be
simple,
and
so
what
we
used
to
do
is
to
use
an
embedded.
It's
a
very
embedded
small
embedded
SQL
database
called
an
h2,
and
in
this
case
we
don't
you
don't
even
need
a
relational
features
of
it.
Yeah.
F
A
A
Yes,
also
that
that
reminds
me
of
this
is
this:
is
the
database
we
James
Brown,
James
and
Guardian
me
used
to
use
back
in
the
bank,
so
I
think
we
will
be
using
that
and
I
need
to
write
that
in
the
spec
as
well,
because
that's
work
also,
the
theorem
address
cannot
be
the
key,
because
we
don't
want
the
adversary'
to
I.
We
don't
go
to
someone
to
hack
the
system
and
learn
how
many
that
addresses
using
secret,
sharing.
F
D
F
A
G
A
G
A
F
A
G
G
Need
to
make
some
changes
in
so
that's
what
I
wrote
you
I
looked
at
and
it's
it's
possible
to
make
the
change
to
do
while
it's
still
still
secure,
I
mean
I,
haven't
done
a
security
proof,
but
it
seems
it
seems
to
still
be
fine
to
make
this
change
the
the
the
reason
we
didn't
do.
It
is
because
we
like
the
way
we
prove
the
security
of
pesto,
is
in
a
very
strong
security
model
called
adaptive
security
which
we
cannot
have
a
if
we
wanna
do
the
threshold
case.
It's
not
it's
not
a
problem.
G
It's
not
a
problem
in
practice,
it's
more
like
a
theoretical
modeling
thing,
so
it
should
be.
It
should
be
fine,
but
the
point
is
that
I
need
to
we're.
Gonna
have
gonna
end
up
having
two
diverging
branches
from
what
we
are
still
working
on
with
the
pesto
right
Alexandra
and
this
this
project,
because
it's
gonna
be
applied
to
some
partners
in
Spain
for
for
like
an
EU
research
project
and
then
what
we
are
doing
so
I'm.
F
A
F
G
F
I
would
still
like
to
you
know
piggyback
on
whatever
other
changes
we
make
around
that
do
you
have
any
any
any
knowledge
of
what
would
be
the
best
way
of
doing
that
now.
G
F
A
B
A
So
what
we,
what
we
typically
do,
is
to
simply
be
very
careful
and
try
to
try
to
stage
the
changes
and
how
to
try
to,
for
example,
thresholds
the
rest
hood.
That's
any
changes
needed
for
that
is
still
in
the
main
software
and
the
only
the
actual
actual
changes
in
the
fork
and
just
two
changes.
I.
A
G
A
Maybe
maybe
James
to
have
a
bath
or
something,
but
he
just
went
to
dinner.
Okay,
so
I
have
this
thing.
Five
points
to
take
on
yeah
I'll
be
pesto
has
to
be
has
to
have
persistence,
storage,
threats,
food
thirst,
good
thing
you
are
going
to
add,
and
the
user-agent
porting
and
the
two-factor
gateway.
That's
the
components
we
need
to
do.
Look
at
least
it's
actually
a
lot
yeah.