[MINUTES] CCG Incubation and Promotion 2025-08-27

CCG Incubation and Promotion Meeting Summary - 2025/08/27

*Topics Covered:*

   1.

   *Decentralized Issuance/Accreditation Mechanism:* The group discussed
   modifications to the PR for a decentralized mechanism for publishing
   acceptable actions by issuers and verifiers. The primary focus was changing
   the language around "grants" to "accreditation" to emphasize the
   decentralized and permissionless nature of the system. Concerns were raised
   regarding the granularity of accreditation (too fine-grained vs. too
   coarse-grained). The need for a generalized, adaptable data model that can
   represent accreditations for issuers, verifiers, and policy holders was
   highlighted. Confusion around the term "issuer" in relation to the list
   owner and issuer of verifiable credentials was addressed.
   2.

   *Data Model for Trusted Entities:* The discussion clarified the
   decentralized nature of the proposed data model, emphasizing its
   flexibility and use across various entities. It was confirmed that the
   model allows for fully decentralized configurations, such as a list owner
   with a single entry.
   3.

   *Integration with Existing Systems:* The group explored the possibility
   of integrating with existing systems like OpenID Federation and ETSI's
   trust list specification. The main point of contention was whether to
   create a superset encompassing all systems or to create a mechanism for
   referencing existing systems (e.g., via pointers) without needing to
   incorporate their entire vocabularies. It was suggested that creating a
   superset data model and a mechanism to point to external lists would be the
   best approach. Concerns were raised about potential duplication of effort
   with the ETSI initiative updating its specifications.
   4.

   *Specification Title and Structure:* The group discussed revising the
   specification's title and restructuring sections 1, 2, and 3 to better
   reflect the decentralized nature and expanded scope of the proposed system,
   including the use of verifiable accreditation for all three roles (issuer,
   verifier, and policy holder).

*Key Points:*

   - The terminology shifted from a centralized "granting" model to a
   decentralized "accreditation" model.
   - The data model is intended to be decentralized and flexible, capable
   of representing various accreditation scenarios.
   - The data model should be a superset of current systems and include a
   method for linking to external systems and specifications to avoid
   redundancy.
   - Sections 1-3 of the specification require revision to align with the
   updated data model and decentralized approach.
   - A revised title for the specification is needed.

Text:
https://meet.w3c-ccg.org/archives/w3c-ccg-ccg-incubation-and-promotion-2025-08-27.md

Video:
https://meet.w3c-ccg.org/archives/w3c-ccg-ccg-incubation-and-promotion-2025-08-27.mp4
*CCG Incubation and Promotion - 2025/08/27 10:56 EDT - Transcript*
*Attendees*

Alex Higuera, Benjamin Young, Dave Longley, David C, Dmitri Zagidulin,
John's Notetaker, Jonathan's Notetaker, Kayode Ezike, Manu Sporny, Parth
Bhatt, Phillip Long, Ted Thibodeau Jr, Tom Jones, Venu R
*Transcript*

Manu Sporny: All right, folks. Let's go ahead and get started. welcome
everyone to the CCG incubation and promotion call for this week. It is
August 27th, 2025. Year is going quickly. we do have an agenda today.
largely it's to talk about the PR that we had discussed modifications to
around the decentralized mechanism for publishing acceptable actions by
issuers and verifiers and roles there's some language changes that people
had asked for and we've gotten some feedback on that from David Chadwick
and a couple other folks so we'll be largely discussing that today

Manu Sporny: we are also probably going to talk at a little more depth
about deferring to complex policy languages through this mechanism. And so
maybe what we're looking to do is create a light version of the spec as it
exists rather than trying to move entirety of other languages over into the
current specification. and then of course ending is the name of the
specification now I think people are not super happy with the name of the
specification. So we're trying to kind of retarget what the specification
is about. so that's the proposed agenda for today. Are there any other
items that people would like to add or modify on the agenda?

Manu Sporny: If not, let's go ahead and jump into the first item which is
this first cut at a more decentralized approach. So one of the pieces of
feedback that we got from the current specification was that it's too
centralized. we want to be able to do things in ways that don't depend on
centralized authorities or centralized lists. it's fine to have that
mechanism but a number of folks said that they were concerned about kind of
recentralizing something that is also possible to do in a more
decentralized manner.

Manu Sporny: so in that vein I raised a R two weeks ago calling it and this
was imperfect at the time calling it things like decentralized issuance
grants in verifiable roles I think the feedback on that was people didn't
like the language around either one of those so went and did a modification
based on the discussion to date. Dimmitri raised issue. Joe raised an
issue. I incorporated those issues in the text to just be clear to people
that, what we have isn't done. We still need to, improve it.

Manu Sporny: based on those I went and updated the PR. Joe wanted to call
it something more along the lines of accreditation. So instead of
verifiable accreditation so that it was clear that anyone can accredit
anybody else. There's no implied it has to be a government or something
like that. the previous language had had a more permissionbased approach.
So retargeted the language away from roles to accreditation which still
allows you to have big governments accrediting smaller bodies or
individuals but it also allows individuals to accredit each other.
00:05:00

Manu Sporny: The examples were updated away from grants to accreditation.
So this is effectively an acitation This is an issuer of some kind
accrediting an issuer they're providing them an accreditation to issue. So
this is an issuance accreditation and then it follows the same kind of
schema that we had last time. Dimmitri, I think your desire to have more
fine grained accreditations would go here, in …

Manu Sporny: approach. I couldn't think of, other type.

Dmitri Zagidulin: If I could…

Dmitri Zagidulin: if I could jump in, I think my concern is in the other
direction. Less of fine grain accreditation and more coarse grained. Is
this a recognized entity or not?

Manu Sporny: Yeah, the KYC credentials. But I thought at the end of the
discussion last time we said that, organizations could be filled with
schema.org organization.

Dmitri Zagidulin: Yes, schema.org organization is fine. It's how to put it
together in a list, right? It's composing that into a list. that's my
primary concern.

Manu Sporny: Okay, let's I guess discuss that, in a bit more depth. I see a
queue forming. Let me make sure I get through this stuff. yeah, so here
Dimmitri, there's an issue that I opened. I didn't see one that you had
opened, so I opened one and linked to it.

Dmitri Zagidulin: No problem.

Manu Sporny: So we should talk about that in more detail. And then the
accreditation thing I linked to up here in the abstract. So this was Joe's
request that he didn't want to focus on grants and allowances and it had
more to do with accreditations. So that's how it was modified. I know David
you have feedback. Dimmitri sounds like you have feedback. so let's go
ahead and start a queue and start getting feedback on the PR. David, you're
up. Yes.

David C: Okay, thank you. Can everybody hear me? Yeah. so the document is
in fact a data model for trusted entities or accredited entities and I've
actually put an issue in where I suggested to change the title to that and
why people thought it was a centralized list is actually a misunder this is
a data model that can be used by anyone for any number of entities.

Manu Sporny: We can make you out, but your audio is being rushed and it's a
bit garbled. but keep going, David. I don't know if there's Yeah.

David C: So the list owner could have indeed just one single entry in the
list and it could be totally distributed totally in line with the original
intention and in fact the train system had that it had many entities in the
DNS which had lists and as I say the list could be from one entity which
could be one subordinate of yours or just somebody to a country that's
listing all the trusted issues creation of the country. So I think that
sorry is people can I hear me properly? Okay. Yeah. so that's why when you
added the bit about decentralized list that perfectly line with the data
model. I don't think it needs to alter the context of the data model at all
really because what we did was said this is everything you actually need to
know about who the list owner is and who the list entities are. Okay.

David C: so that's the first point I wanted to make that having a
decentralized totally in line with what we planned from the beginning and I
don't think that message got through to people. The second thing is this is
meant to be about trusting all three roles within the current VCDM. So it's
meant to be about issuers, verifiers and policy or holders. and in fact all
are needed and changing it in your text that you've got now where you talk
about an issuer that is very confusing because an issuer is in VCDM model
it's the issuer of VC. whereas we've called it the list owner to
differentiate from the issue of a VC. if you got fully decentralized model
where the list owner has a list of just one then and it issues a VC then of
course it's the issue of the VC but we still think you ought to give it a
different name issuer because it's confusing to have the issuer of a right
and then the issue of a verifiable credential even though in history model
they are the same. Did that make sense to people?
00:10:00

Manu Sporny: Let me try and reflect back what you said, David. I think
everyone's having trouble hearing you because of your audio. so if I can
try and summarize, you're saying, the initial intent was for this to be
decentralized. so there seems to have been a misunderstanding of the
specification. meaning if you're fully decentralized, you are a list owner
and you have an entry that's one deep and that sort of thing was supported
previously. so I think that was one of the points that you were making.

Manu Sporny: I think the second point that you were making is that it's
important to have additional kind of metadata about the list owner meaning
everything that was in train thing effectively this data model so the data
model is meant to be decentralized it's only a data model

Manu Sporny: doesn't need to be at any particular location because it's a
data model it can be published through any means necessary and then I think
that your third point was that this issuer section here is confusing I
didn't quite understand why I think from what it sounded like I think you
are reading this issuer as

Manu Sporny: as the issuer of the list when it's not meant to be this is
the accredititor that you said use a different word that I think the
accredititor is providing a verifiable credential that speaks about the
issuer and the accreditation that the accredititor is giving to the issuer
but I think you're saying that there's confusion around that did I fairly
summarize your points, David?

David C: Yeah, I think basically yeah the list operator in this particular
6.1 section the verifiable credit should be provided by a list operator
right because is it not the list operator that's accrediting someone right
so that's…

Manu Sporny: Yeah, it's the list operator. Yeah, to be clear,…

David C: why I'm saying don't exactly so don't call it the issuer there…

Manu Sporny: the list operator. Go ahead.

David C: because that's confusing because the issuer is the issue of a
verifiable credential that you are trusting. I know we've got a bit of
recursion here because that when the list operator issues a list as a
verifiable credential which only contains one entity in it, that itself is
a verifiable credential and therefore the list operator becomes an issuer
of that verifiable credential.

David C: But it's not the verifiable credential in the VCDM meaning because
in that meaning we're thinking about a driving license or a degree
certificate or…

David C: something like that not a verifiable credential about the issue of
one of those things. Does that make sense to people?

Manu Sporny: I'll pause to see… if anyone's got questions. go ahead Dave.

Manu Sporny:

Dave Longley: I think I understand your meaning, David, but just from my
perspective, I consider each of these things to be a verifiable credential.
I accept that recursion, but I agree that it can be confusing in the
language of the spec. And so we should call out more clearly which issuer
we're talking about or use different language to talk about the issuer of
this list credential as opposed to the issuers that they talk about in the
list credential.

Dave Longley: But I take your point.
00:15:00

David C: Correct. Thank you very much.

David C: That's the point I was trying to make.

Manu Sporny: So, as far as a concrete change, David, should we change this
type to accredited entity or something like that? what concrete changes
should we make to this data model to Yes,…

David C: It was in the text Where a verified credential can be provided. to
an issuer is that the issuer of a verifiable credential in the conventional
meaning of the sense?

Manu Sporny: correct. …

David C: But again it's not generic enough because accreditation can be
provided to a verifier or a wallet. And so to put issue in there
immediately gets people thinking we're only talking about one entity within
the VCDM model. So I think that right

Manu Sporny: I see what this section is only about issuing accreditation. I
was taking a cut on something very specific and very concrete and there was
going to be a section on verifying accreditation and all different other
types of accreditation.

Manu Sporny: The challenge there of course being how many different types
of accreditation could there be. again as Dave said I take your point.

David C: All right.

David C: And yeah,…

Manu Sporny: I'm trying to figure out how we say if you want to accredit an
issuer this is how you do it. okay.

David C: So I would call that issuer accreditation rather than issuing
because issuing accreditation is again ambiguous because it could mean the
issuing of an accreditation right or…

Manu Sporny: Yep.

David C: it could mean the accredititation of an issuer.

Manu Sporny: Change this title and language to issuer accreditation or…

David C: Yes. Of an issuer.

Manu Sporny: accreditation of an issuer and that would All right.

David C: Right. Exactly.

Manu Sporny: I can do that and…

David C: But I didn't understand that this was going to be one of three.

Manu Sporny: then I can update the language gear,…

David C: I read it as this is the only one.

Manu Sporny: right? Yep. Yep. Yep.

David C: Right. Okay.

Manu Sporny: So, maybe adding an issue marker to say we I might just add
the other sections in here. I wanted to try to start with some smaller text
instead of, Okay.

David C: Probably you could try and make it generic straight away and just
put the issuing of accreditations as the title and then it becomes generic
because that's how I read The issuing of accreditations.

Manu Sporny: And then maybe have three examples or…

David C: Yeah. Yes. Yeah.

Manu Sporny: at least two, I can try to make it generalized and see how
that goes. Dimmitri, you've got your hand

Dmitri Zagidulin: So, here can you scroll down? I just want to see the
example two accredititation. I see. Credential subject. And so, yeah, the
bit I'm trying to get a sense for is how does this compose into a list?
Would the idea be that the registry is a list of these verifiable
credentials?

Manu Sporny: Yes. Yep. I think so.

Manu Sporny: You would just take these and there would be a giant list of
these things and you could piece them together from all kinds of different,
you could take one, if there are four accrediting bodies,…

Dmitri Zagidulin: Got it. Okay.

Manu Sporny: you could take all of their published things of this nature
and put it together in a higher level list.

Dmitri Zagidulin: And I see I see.

Manu Sporny: I don't think we've proposed what that higher level list looks
like yet Dimmitri we still need to do that. So this is the primitive that
would be Y.

Dmitri Zagidulin: And So if the entity is let's say both an issue and a
verifier do you foresee having the credential subject type be an array or
would there be a multiple credential subjects?

Manu Sporny: Yes it would. let's see. if it's the same subject, there would
be an array of accreditations. One for issuance, one for verification, one
for KYC,…

Dmitri Zagidulin: It's just it's the credential subject type that not the
issuance…

Manu Sporny: one for And I see you right.

Dmitri Zagidulin: but the type issuer. Yeah, that's the thing that worries
me.

Manu Sporny: Yeah. I agree. That would become a problem at that point.

Dmitri Zagidulin: That's enough.

Manu Sporny: So I guess we could do an array of credential subjects and I'm
unsure about this type here.

Dmitri Zagidulin: Yeah, I don't think we even need that one because the
accredititations will speak for themselves.

Manu Sporny: Yeah. Yeah.

Manu Sporny: The only reason the type's there is to kind of kick in the
JSON LD scoped, stuff, but we don't sure.

Dmitri Zagidulin: If that's the case,…

Dmitri Zagidulin: then we could type it as known entity.
00:20:00

Manu Sporny: So we could go shift to a se separate type that's more
generalized. plus one. We could do that. I guess I'm just trying to
highlight I don't know how I feel about this and…

Dmitri Zagidulin: Gotcha. Okay.

Manu Sporny: it's probably wrong.

Dmitri Zagidulin: Got it.

Manu Sporny: But other than that, did that answer your question? Demetri,
does structurally it makes sense?

Dmitri Zagidulin: Yes. Yes. I think it makes sense.

Manu Sporny: Okay. All Sounds good. go ahead, Dave. Mhm.

Dave Longley: Yeah, I wanted to talk about something else,…

Dave Longley: but just quickly on this point, I think a type is really
useful, but maybe it should just be the credited entity or, something
generic like you were saying. so that what you're talking about is
something that has some kind of accreditation. Then you would go look at
those accreditations. the point I wanted to make was to be responsive to
David's comments about people's view of this specification previously as
being more centralized than we would like. And I think a lot of that had to
do with the language that was being used about in some of the places around
authorities and granting permissions in spaces.

Dave Longley: So it gave the impression that for some set of types of
credentials that there would be an authoritative body or an authority that
you would choose and you would choose that one authority and that authority
would then grant these permissions for people to make claims. And it was
mostly just in that languaging that we wanted to change to shift to say
that we're really talking about accreditations or just that someone might
recognize various issuers verifiers in certain ways to make certain claims
or to issue certain credentials or to be able to request them in certain
ecosystems. and so we just wanted to shift that language because that makes
it more obvious that it's decentralized. You could use many of these lists.
You could use them at once. Anyone can make these lists. And it could work
for individuals all the way up to, government institutions and so on.

David C: Can I respond to that, Dave? Yeah, I totally take your point. what
I wanted to say was that sections one, two, and three were mostly inherited
from version one of this document that was written by the previous editors,
and we hardly edited that. Our main work was on the data model. and I
accept the fact that we really need to go back and re reward the holes of
section one, two, and three.

Manu Sporny: Okay, good.

Dave Longley: Yep, sounds good.

Manu Sporny: I think we're all in agreement on that. Dave. Go ahead.

Dave Longley: Yeah, I was just agreeing that that sounds good. there was no
judgment over, where the text came from. It was just going forward kind of
giving feedback on where we wanted to go and make sure that this fits in
with the three-party model and the decentralized ecosystem that all this
technology is for.

Manu Sporny:

Manu Sporny: Plus one to So, I think we have general agreement that we
definitely need to make a pass over sections 1, two, and three to make sure
it still is aligned with what the group thinks is the right thing to do
here. that includes, the title of the specification probably not being
right. We've got to pick a new title, which we'll talk about today. and it
includes us making these adjustments as David was trying to make it clear
that this is accreditation for all types of different roles not just
issuers and then Dimmitri's suggestion to change this to what something
like Dave said which is accredited entity or something like that.

Manu Sporny: So I can make at least the passes on this PR and then the
other things are future changes that we might need to make. So if we made
those changes to this section are there any other items that people are
concerned about or the general direction that we're headed in? Is the
accrediting language better than the grant language and…

Manu Sporny: the authorized language we were using before? Are there any
other concerns about the PR Mhm.

David C: Can I just on that type issue?

David C: Maybe that type should be tightly controlled by this specification
and is defined in this specification. It's the only type that we're going
to issue at the moment. It's the only type we're going to say we're going
to define. So the type could be something around the title of this document.

Manu Sporny: Yeah, agreed. I think we end up defining that type in this
specification. All right, that sounds good. if there are no other comments
on the PR itself, let's go to some of other discussion. one of the things
that came up in the discussion of the data model is that this is fair this
is train it came kind of from the train specification.
00:25:00

Manu Sporny: there was also a point made about open ID federation basically
it's got a different vocabulary right let's say arbit picking an arbitrary
number there's 60% overlap with the open ID federation specification and so
we had talked about mapping one of these things to another of these things
but the other concern here is that there are probably other list mechanisms
out there, And the danger that we run here is that we create something just
for these two list types and then for the other list types we leave them
out.

Manu Sporny: One suggestion is to try and figure out a way to point to
other lists and vocabularies without having to pull them in their entirety
into this specification. So what that would look like is something like
this, Where we would say, there exists and this is all wrong. don't take
the example at face value. the concept it's trying to get to is that there
is this list out there defined by a completely different data model all
that kind of stuff but it is in the format that whatever other trust list
specification is in.

Manu Sporny: So this could be an open ID federation, It could be a train
description. It could be something of that nature. And so instead of trying
to create yet what we make this data model do is just point to other lists
very simply so that people can use this credential to point to whatever set
of lists that they want to and provide cryptographic assurances over let's
say the state of the list and things like that through things like related
resource.

Manu Sporny: Let me stop there and see what people's thoughts are on that.
what that would mean is that our data model would be drastically
simplified. meaning the data model would just be able to point to external
lists and it would be able to express accreditations of this form. and the
data model would not have these properties in here.

David C: What's

Manu Sporny: it would just point to a list and another specification that
would wholly define these properties. so let's hear some feedback on that.
what are folks thoughts? go ahead, David.

David C: So, while you said train itself was taken from an exi standard.
the Etsy standard is actually in wide use in Europe. it was built to
specify trust in X509 entities. and there's a European list of lists and
then every country has a list of its trusted X509 issuers certification
authorities. Yeah. So the vocabulary the trainers was taken exactly from
that but it had limitations because it didn't have the ids and it didn't
nothing was in JSON either it was all in XML. So what we did we've modified
the exit standard to include the decentralized issues and things like the
schema of the issue.
00:30:00

David C: what's happening in parallel with this work at this as we speak is
there the Etsy people are updating their documentation because they realize
that the standard that's used at the moment only was designed for X9 and
not for verifiable credentials and wallets and so they're revising their
spec and I've had some discussion with them and they're hoping to get the
first version of their spec out in September which might be out for review.
Now the other point to note is they will increase their existing vocabulary
to include probably DIDs and decentralized roles etc. But they also have a
lot more in their data model than we've incorporated in this. So not only
did we add bits to it but we took a lot out as well. So this data model is
an intersection of the Etsy one in a way. for example Etsy has a whole
chunk on the history of lists. So not only can you find out what the list
is now but you can also find out what the list was last year or whenever.

David C: So there's a whole history of the trusted lists as well. We've not
put that into model, but I realize that some people may want that. They may
want to be able to know, okay, I'm not interested in what's trusted today.
I'm interested in what was trusted last year when I did ABLC. So that's
just some further background information onto the gallery.

Manu Sporny: Yeah, and that's helpful background, David. I guess, and
that's good new information. I guess that increases my concern that we may
be duplicating effort with the other initiative. I know the delta here is
that some things have been removed. some things are, ahead of what the
previous Etsy model is. but it feels like if there's another group out
there that is defining that thing and what we are doing is subsetting it in
this specification, it feels like it may be better for us to just be able
to point directly to whatever they end up creating in the future.

Manu Sporny: meaning if they're doing the work to include DIDs and digital
wallets and VCs and things like that then I see that as a strong argument
for they will publish some set of lists in the future and this
specification should be able to express pointers to those lists…

Manu Sporny: which have a much richer vocabulary that's aligned with
European standards for doing trust lists I feel like we would be
duplicating effort if we tried to even take a subset of that.

David C: Can I just go?

David C: Yeah, because when I talk to them about that, you have to bear in
mind that their work is focused totally on Europe and European digital
identity wallet and it's not interested in anything else outside of Europe.
and therefore we thought that this work should be a superet of that and be
global in scope because we didn't want to be limited to just what was valid
for Europe. So things that were valid outside of Europe should be within
this model.

Manu Sporny: Okay, Under understood. do we have any other kind of input on
what direction we should go here?

Manu Sporny: Go ahead, Dave.

Dave Longley: That was a little hard for me to follow,…

Dave Longley: but if there's going to be a specification that's coming out
in September that is been modified to work with VCs and digital wallets, it
seems that it would be ideal if this spec can link to those in the same way
that this spec could express different lists and different ecosystems that
already exist, including what Tom has mentioned in chat. here about open ID
federation systems. those systems that are working for people that don't,
create privacy harms or whatever and nobody's looking to transition from
those could be linked via the work in this spec without having to change
those. But the spec should also enable newer ecosystems that can try to
avoid some of the privacy harms that existing systems have brought.

Dave Longley: And that's not necessarily going to apply to organizational
identity and so on where existing ecosystems and data models are out there.
So ideally this spec can link and find commonality to bring those different
pieces together and enable more decentralized and privacy preserving
mechanisms going forward for trust.

Manu Sporny: And Dave, I didn't quite understand what that was an argument
for.

Dave Longley: I don't know enough about the eco David has said that he has
looked at this existing stuff from Etsy that's in an XML format there and
currently Etsy is updating all of that and he's taken some data model
elements from that space and removed others based on some constraints that
I don't know all about and the question is do we need to do that or at this
point since we know that they're producing another spec, we don't know
what's going to be in or out of that. will we be able to simply reference
what they do since they are modernizing their own specification and data
model. So maybe that's not something we need to do here.
00:35:00

Dave Longley: And so maybe we can focus on gluing these ecosystems together
and putting in the pieces that will allow people to create and express
accreditation, recognition and so on in a decentralized way and then
potentially all also talk about how you can share those kinds of
credentials in a more privacy preserving way without leaking information as
you have ver if you presented a credential to a verifier, you don't
necessarily want them to go traverse a big list and…

Dave Longley: and hit a bunch of endpoints and set off signals that you're
sharing that credential. And so this spec could enable protocols that don't
do that.

Manu Sporny: Okay, got it.

Manu Sporny: Phil, you're up.

Phillip Long: Yeah, I think I agree with the spirit of Dave what you're
saying, but I think David has already indicated that the thing that the EU
is doing is very EU centric. It will work entirely within that context. It
might work other places as well, but they're not really paying attention to
that and it's not their concern. so it sounds to me like we're talking
about a superset and that we can have a generic way of referencing any
number of other mechanisms, OIDC, the EUs or whatever. but that our focus
should be on the decentralized JSONLDD world that is not yet part of those
things specifically and whatever uniquenesses that they provide. Thanks.

Manu Sporny: Thanks, all right. what concrete thing are we doing as a
result of this discussion? It sounds like people are arguing that we should
do a superset. I don't know if people are arguing that we should be able to
point to other list types like Open ID Federation or the Etsy one or I
think I'm hearing no, we shouldn't do that. is that what I'm hearing? I
mean, I'm hearing we should define a superset and we shouldn't point to
Open ID federation and we shouldn't defi point to Etsy.

Dave Longley: So I'm not arguing that we have to do one the other that
they're mutually exclusive. It seems to me like if we have found that we
need to do more because it's not going to be European specific. It's more
global. That makes sense. But we shouldn't preclude being able to reference
existing things that are in the ecosystem or entities that might be in the
EU and they already have a bunch of stuff. It would be good to be able to
have our data model talk about this entity and say and by the way they have
this Etsy thing that we can link to and you can follow that and if you're
in that ecosystem you can just follow and use that.

Dave Longley: I don't think we're trying to intentionally create
incompatibilities in what we're saying here. But I think we should try to
facilitate more interoperability even if this spec is the glue that helps
make that happen.

Manu Sporny: So then that is an argument for doing both of the things.
Meaning we should be able to point to external trust lists and trust list
specifications and we should define a superset. Is that what folks are
saying?

Phillip Long: I'll jump in and say I thought that's what we were actually
trying to do. Focus on the one that we care about, but allow a generic way
to point to others that could be added to over time as others emerge or as
changes to the others ex are made. but allowing this to be the skeleton
that includes those and…
00:40:00

Phillip Long: very specifically highlights the unique valuable
characteristics of the JasonLD world that we're in.

Manu Sporny: Okay. …

Manu Sporny: I think I understand, Phil, just to be clear, we're going to
have three different mechanisms by the time we're done with the
specification. That's the path that it seems like we're on. So we have this
verifiable accreditation thing which is a very tight mechanism. So this is
Mechanism two is the Etsy derived thing the superset which does not have
any overlap with this data model down here. So these are two kind of
distinct ways of doing things. So this is a superset data model and then we
are going to create yet a third data model to point to things that are
outside of the specification like open ID federation and the Etsy stuff. Go
ahead Dave.

Dave Longley: it says it in the title there that it's just about the list
operator and that seems like these are extra bits of information about
whomever is making an accreditation list which is not the same thing as
listing the accreditations that they're offering to issuers, verifiers,
whoever else. and if our list of attributes is fairly small, I don't know
if my memory of this is that there was a lot more to it, but maybe it does
fit on a single screen there. I don't know. yeah, there's some more stuff
there.

Dave Longley: these attributes are closer to what Demetri was talking about
in making statements about a particular entity or in this case maybe
statements about a particular entity that is publishing such a list and
those things are different from the list itself and so I wouldn't say that
those are two different mechanisms they have two wholly different purposes
now when we get to linking to Those other ecosystems, each one might have
its own different set of features that it offers, including some that might
make statements about entities, some that might make statements that are
approximating accreditations or grants or permissions, and other ones won't.

Dave Longley: But it seems to me like what we would have in this spec is
the list which is one thing and then some kind of credential. it looks to
be about the list creator and that we need to figure out where this linkage
to other ecosystems would come in.

Manu Sporny: Okay, good. That's Yes.

David C: Can I respond to that because Yeah.

Manu Sporny: Real quick, David, I forgot I need to go in five minutes. so,…

David C: Okay. Yeah.

Manu Sporny: please go ahead and then we're going to need to handle it

David C: the intention was that if you're going to issue a verifiable
credential as a list operator, then all the properties in the verifiable
credential would come from either 4.11 which are attributes about myself or
would come from 4.2.1 which are attributes about the entity that I'm
talking about.

David C: So that's why I made my comment into I don't know whether it was
the issue or the PR. I said we need to make sure that the properties in the
verifiable credential that you've specified are included in 411 and 421
because the verifiable credential should be using that data model. That's

Manu Sporny: Noted. we are going to have to continue this discussion next
time. sorry, forgot that I had to be on another call very soon. okay but I
think the core of the discussion here is that for the use cases that we
have what part of the list operator what part of the TSP and then what part
of the accreditation we need to define and to be clear we can create a
vocabulary that defines each one of these things like they're talking about
effectively different entities and they have different purposes as Dave
longly mentioned

Manu Sporny: mentioned I guess the question is who needs what to achieve
which use case. So maybe next time we can focus on the use cases that are
achieved where you need each one of these data models to kind of achieve
the use case. I know that would help me understand a bit better about why
you need to express a TSP and why you need to express a list operator. for
next week I'll go ahead and update the PR to align with what folks said.
and then that may get merged over the weekend if we get good feedback on
it. If we don't then we'll discuss again next week.
00:45:00

Manu Sporny: And then next week it sounds like we're going to be focusing
on, what data model are we act, what's the core data model? what use cases
really are we trying to support with the data model? and then, at some
point we're going to want to rewrite the first three sections to align with
whatever we end up with in the data model in, sections four, five, and six.
But we're making progress. I think we're, coming to an understanding on…

Manu Sporny: where each person's coming from. So, that's good. I think
that's it for the call today. thank you again very much. really it was I'll
have to leave.

David C: Could I ask that…

David C: if other people have got 10 minutes, we could discuss the issue I
put about the change of title and perhaps discuss that for the next 10
minutes because that was in your original agenda, wasn't it? I see.

Manu Sporny: I don't know what happens when I drop off the call. I'll try
to leave the call running and hopefully the Scribbot will do the right
thing.

David C: Cuz you started it.

Manu Sporny: Yeah, I think it'll be fine…

David C: Okay. Yeah.

Manu Sporny: if I'm you're welcome to stay around and kind of chat about
that. I'll try to make sure that the call continues to thanks everyone.
over to you, David. Take care.

David C: Okay. yeah, it's working.

David C: So there is an issue where I proposed a change of title.
unfortunately I don't have that issue number directly to hand. I don't know
if anybody else does let me just see if I can find it. and I could then
share my screen and show it to you. yeah, it's issue number 30. Okay.

David C: do people want me to share my screen and show that if I can do
that? Let's share screen. I've never done this before, so tell me if that's
working. let me go to here.

David C: Hello.

Dave Longley: Yep.

Ted Thibodeau Jr: Yes.

Kayode Ezike: Yeah.

Phillip Long: It's fine.

David C: Can people see Yeah. This is So was the discussion with data model
for verifiable lists of verifiable potential length is very long but it
gets across the three things that it's two it's only data model for
verifiable lists and the verifiable lists are for entities that are in the
verification data model my wife just taken a phone call in the same room as
me right okay she's gone now that so I don't know what people think about
that verifiable accreditation list Dave has put in

Dave Longley: Yeah, I thought that title seemed a little bit long as you
were saying. it may be a little hard to understand. because It's a data
model for some kind of lists that are about verifiable credential entities,
which could be more or less anything. And so we might want to make it a
little more specific to our work and reuse that accreditation language that
we just recently adopted. so I made that other proposal for verifiable
accreditation lists and if we need a subtitle about data model or something
we could do

Dave Longley:

David C: Yeah. the…
00:50:00

David C: what it doesn't say is that it's verified crediation of what and I
wanted to get in it was for the VC data model which was the last three
words in my title were meant to say that it's for the verifiable credential
data model.

Dave Longley: Yeah, we might be able to do that with a subtitle and that
way we keep the main title

David C: Yeah. Yeah.

David C: So in other words, we want to say I don't mind that as a main
title, but we need to say it's a data model and b it's for entities within
the VCDM. Yeah. Seems to all right.

Dave Longley: Yeah, I was just trying to edit my thing with a little
subtitle. let's see.

David C: Because I think the world seems to have agreed that verifiable
credentials is the W3C term now,…

Dave Longley: A data model for verifiable credential and crediting Yes,…

David C: haven't because the other people are not using that now, are
They're using think digital credentials or Yeah.

Dave Longley: that's right.

Dave Longley: I'm just going to edit my comment. I don't quite like that
subtitle,…

David C: It's crazy.

Dave Longley: but I think the subtitle needs more work. so other people
could make other proposals there.

David C: I quite like it myself. Okay. I think that's good. So that was a
valuable five minutes and it's at least got something for people to work on
now. and we can do that in our own time. So I just want to point to people
to say taking on board it is a data model and we want that to be somewhere
in the title even if it's only in the subtitle. Again does what's the VTDM
one?

David C: Just remind me is that verify potential data model is that in the
full title yeah me let me look yeah so that's…

Dave Longley: Yeah, I would have to look. I think that's right.

Phillip Long: I think that's correct.

David C: why I think we maybe ought to put data model into the title rather
than in the subtitle.

Dave Longley: I don't know that there's a hard rule. if we can have a
shorter title that accomplishes the same thing, I think that's fine. we
could, of course, have it verifiable creditation list data model. It's kind
of a mouthful then. but the issue is open,…

David C: Yeah. Yeah.

Dave Longley: so people could put some more suggestions in there and then
see what other people think.

David C: Okay, I'm happy to close the meeting now if nobody else wants to
say anything. Okay. Okay.

David C: Thank you everybody and thank you Manuel for chairing it so
successfully and hope speak is it are we meeting weekly or fortnightly? All
right, because I was away every Wednesday I had something on all day, so I
couldn't come in. So, you next week then hopefully. Thank you guys. Bye.

Dave Longley: I believe it is weekly same time input.

Dave Longley: Thanks everyone.
Meeting ended after 00:53:59 👋

*This editable transcript was computer generated and might contain errors.
People can also change the text after it was created.*

Received on Wednesday, 27 August 2025 22:06:52 UTC