You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Aug 25, 2024. It is now read-only.
Copy file name to clipboardExpand all lines: CONTRIBUTING.md
+28-11Lines changed: 28 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -189,7 +189,7 @@ Boundries: I will federate changes from you and forward changes to others I am f
189
189
190
190
-#1287
191
191
192
-
Virtual branch - shared context dependent trains of thought within a poly-repo environment. If the overlays of an entity currently federating with. The N+1 federation new data event is always determined by a KERI duplicity detection protected channel. The tcb for trust evaluation is also party of relying party inputs.
192
+
Virtual branch - shared context dependent trains of thought within a poly-repo environment. If the overlays of an entity currently federating with. The N+1 federation new data event is always determined by a KERI duplicity detection protected channel (this is critical because or else we are not able to see who is being duplictus over time, which we need for the relying parties analysis of ClearForTakeoff for AI agent (workload) identity (OIDC, sould based auth). The tcb for trust evaluation is also party of relying party inputs.
193
193
194
194
-https://github.com/pdxHijohnny/dotfiles/issues/1
195
195
@@ -423,7 +423,9 @@ Alice will see problems and look for solutions. Problems are gaps between the pr
423
423
This document outlines requirements and their stringency levels using different examples.
424
424
It defines actions taken by maintainers. Timelines for progression and example architypes for varying levels of maintainer / contributor involvement / engagement.
425
425
426
-
- 1st Party
426
+
- Keyword Definitions used in Documentation
427
+
-https://www.rfc-editor.org/rfc/rfc2119
428
+
- DFFML
427
429
-https://github.com/intel/dffml/issues/1207
428
430
-https://github.com/intel/dffml/issues/1252
429
431
-https://github.com/intel/dffml/issues/1061
@@ -432,13 +434,28 @@ It defines actions taken by maintainers. Timelines for progression and example a
-> The Supply Chain Integrity, Transparency, and Trust initiative, or SCITT, is a set of proposed industry standards for managing the compliance of goods and services across end-to-end supply chains. In the future, we expect teams to output "attestations of alignment" to the S2C2F requirements and store it in SCITT. The format of such attestations is to be determined.
440
+
- These attestations of alignment are outputs from successful chains of policy engine evalutions
441
+
-**TODO** relying party phase stuff from SCITT + LiteLLM commits linked added comments in code
442
+
-> ING-4 Mirror a copy of all OSS source code to an internal location
443
+
- This doc and the `THREATS.md`, the repo, and context data gained from allowlisted trusted sources seeds the basis for the trust store in that those aspects define the policy engines initial execution state pre-first new data event federation. The seed data is the basis from which all policy engine evalutions begin, as models within them may change given the inherent feedback loop in decentralized value chain analysis.
-> indirect nethod: "Because I am not always online I have my identifier's history served by online Witnesses. Your validator can do duplicity detection on those witnesses and validate whether or not I am being duplicitous"
453
+
-> Ambient verifiability: Verifiable by anyone, anywhere, at anytime. E.g. Ambient Duplicity Detection describes the possibility of detecting duplicity by anyone, anywhere, anytime.
454
+
- This fits nicely with SCITT's COSE countersigned receipts
455
+
-> Duplicity
456
+
>
457
+
> In KERI consistency is is used to described data that is internally consistent and cryptographically verifiably so. Duplicity is used to describe external inconsistency. Publication of two or more versions of a KEL log, each of which is internally consistent is duplicity. Given that signatures are non-repudiable any duplicity is detectable and provable given possession of any two mutually inconsistent versions of a KEL.
458
+
>
459
+
> In common language 'duplicity' has a slightly different connotation: 'two-facedness', 'dishonesty', 'deceitfulness', 'deviousness,'two-facedness', 'falseness'.
0 commit comments