Skip to content
This repository was archived by the owner on Aug 25, 2024. It is now read-only.

Commit 876cbe1

Browse files
John Andersenpdxjohnny
authored andcommitted
CONTRIBUTING: Rework references section
1 parent 82227f6 commit 876cbe1

File tree

1 file changed

+28
-11
lines changed

1 file changed

+28
-11
lines changed

CONTRIBUTING.md

Lines changed: 28 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -189,7 +189,7 @@ Boundries: I will federate changes from you and forward changes to others I am f
189189

190190
- #1287
191191

192-
Virtual branch - shared context dependent trains of thought within a poly-repo environment. If the overlays of an entity currently federating with. The N+1 federation new data event is always determined by a KERI duplicity detection protected channel. The tcb for trust evaluation is also party of relying party inputs.
192+
Virtual branch - shared context dependent trains of thought within a poly-repo environment. If the overlays of an entity currently federating with. The N+1 federation new data event is always determined by a KERI duplicity detection protected channel (this is critical because or else we are not able to see who is being duplictus over time, which we need for the relying parties analysis of ClearForTakeoff for AI agent (workload) identity (OIDC, sould based auth). The tcb for trust evaluation is also party of relying party inputs.
193193

194194
- https://github.com/pdxHijohnny/dotfiles/issues/1
195195

@@ -423,7 +423,9 @@ Alice will see problems and look for solutions. Problems are gaps between the pr
423423
This document outlines requirements and their stringency levels using different examples.
424424
It defines actions taken by maintainers. Timelines for progression and example architypes for varying levels of maintainer / contributor involvement / engagement.
425425

426-
- 1st Party
426+
- Keyword Definitions used in Documentation
427+
- https://www.rfc-editor.org/rfc/rfc2119
428+
- DFFML
427429
- https://github.com/intel/dffml/issues/1207
428430
- https://github.com/intel/dffml/issues/1252
429431
- https://github.com/intel/dffml/issues/1061
@@ -432,13 +434,28 @@ It defines actions taken by maintainers. Timelines for progression and example a
432434
- https://github.com/intel/dffml/issues/1300
433435
- https://github.com/intel/dffml/issues/1657
434436
- https://github.com/intel/dffml/blob/f8377d07e181aaf69ba2fe168668dae4022bb436/docs/arch/alice/discussion/0036/reply_0067.md?plain=1#L14-L25
435-
- IETF
436-
- https://www.rfc-editor.org/rfc/rfc2119
437-
- https://datatracker.ietf.org/wg/scitt/about/
437+
- OpenSSF
438+
- [OpenSSF: Secure Supply Chain Consumption Framework (S2C2F): Simplified Requirements: Appendix: Relation to SCITT](https://github.com/ossf/s2c2f/blob/a08b79e61e27cc1e036837d93b32f2b4a9766cc4/specification/framework.md#appendix-relation-to-scitt)
439+
- > The Supply Chain Integrity, Transparency, and Trust initiative, or SCITT, is a set of proposed industry standards for managing the compliance of goods and services across end-to-end supply chains. In the future, we expect teams to output "attestations of alignment" to the S2C2F requirements and store it in SCITT. The format of such attestations is to be determined.
440+
- These attestations of alignment are outputs from successful chains of policy engine evalutions
441+
- **TODO** relying party phase stuff from SCITT + LiteLLM commits linked added comments in code
442+
- > ING-4 Mirror a copy of all OSS source code to an internal location
443+
- This doc and the `THREATS.md`, the repo, and context data gained from allowlisted trusted sources seeds the basis for the trust store in that those aspects define the policy engines initial execution state pre-first new data event federation. The seed data is the basis from which all policy engine evalutions begin, as models within them may change given the inherent feedback loop in decentralized value chain analysis.
444+
- Luke 8:17
445+
- IETF
438446
- https://scitt.io
439-
-
440-
- https://datatracker.ietf.org/wg/keytrans/about/
441-
- KERI
442-
- https://keri.one
443-
- https://github.com/decentralized-identity/keri/blob/352fd2c30bf3e76e8f8f78d2edccd01a9f943464/docs/KERI-made-easy.md
444-
- World
447+
- https://datatracker.ietf.org/wg/scitt/about/
448+
- https://datatracker.ietf.org/wg/keytrans/about/
449+
- KERI
450+
- https://keri.one
451+
- https://github.com/decentralized-identity/keri/blob/352fd2c30bf3e76e8f8f78d2edccd01a9f943464/docs/KERI-made-easy.md
452+
- > indirect nethod: "Because I am not always online I have my identifier's history served by online Witnesses. Your validator can do duplicity detection on those witnesses and validate whether or not I am being duplicitous"
453+
- > Ambient verifiability: Verifiable by anyone, anywhere, at anytime. E.g. Ambient Duplicity Detection describes the possibility of detecting duplicity by anyone, anywhere, anytime.
454+
- This fits nicely with SCITT's COSE countersigned receipts
455+
- > Duplicity
456+
>
457+
> In KERI consistency is is used to described data that is internally consistent and cryptographically verifiably so. Duplicity is used to describe external inconsistency. Publication of two or more versions of a KEL log, each of which is internally consistent is duplicity. Given that signatures are non-repudiable any duplicity is detectable and provable given possession of any two mutually inconsistent versions of a KEL.
458+
>
459+
> In common language 'duplicity' has a slightly different connotation: 'two-facedness', 'dishonesty', 'deceitfulness', 'deviousness,'two-facedness', 'falseness'.
460+
- World Wide Web Consortium
461+
- https://activitypub.rocks

0 commit comments

Comments
 (0)