[MINUTES] CCG Atlantic Weekly 2026-01-20

W3C Community Group Meeting Summary

*Date:* 2026/01/20 *Time:* 11:55 EST

*Attendees:* Benjamin Young, Brent Zundel, Dmitri Zagidulin, Drummond Reed,
Erica Connell, Geun-Hyung Kim, Greg Bernstein, Gregory Natran, Harrison
Tang, Ivan Dzheferov, JeffO - HumanOS, Jennie Meier, Kaliya Identity Woman,
Kayode Ezike, Mahmoud Alkhraishi, Otto Mora, Parth Bhatt, Phillip Long, Rob
Padula, Ted Thibodeau Jr, Will Abramson
------------------------------
Meeting Summary

Drummond Reed presented an in-depth overview of the First Person Project
and the Decentralized Trust Graph working group. The presentation focused
on the challenges and solutions related to proof of personhood, agenthood,
and building a decentralized trust ecosystem. Key concepts discussed
included Decentralized Identifiers (DIDs), Verifiable Credentials,
Verifiable Relationship Credentials (VRCs), and the role of Zero-Knowledge
Proofs (ZKPs) in privacy-preserving interactions. The discussion also
touched upon the application of these concepts to AI agents and the future
development of interoperable wallets and trust protocols.
------------------------------
Topics Covered

   - *Introduction to First Person Project and Decentralized Trust Graph:*
   Overview of the project's goals and its origin within the Linux Foundation.
   - *Proof of Personhood:* Discussion on the necessity of proving human
   identity, especially in the context of AI, and exploring solutions beyond
   biometrics.
   - *Decentralized Trust Graph (DTG):* Explanation of the DTG as a graph
   of trust relationships, analogous to a social graph, but focused on trust.
   - *Verifiable Credentials and DIDs:* The foundational role of DIDs and
   verifiable credentials in building the trust graph.
   - *Verifiable Relationship Credentials (VRCs):* The concept of VRCs as a
   new type of credential for establishing peer-to-peer trust relationships.
   - *Agenthood and AI Agents:* Applying the principles of identity and
   verifiable relationships to AI agents, enabling them to act on behalf of
   humans.
   - *Categories of DIDs:* Discussion on relationship DIDs, membership DIDs
   (mDIDs), and persona DIDs for managing identity and correlation.
   - *Credential Types in DTG:* Overview of edge credentials (VRCs,
   Verifiable Membership Credentials), annotation credentials (persona DIDs),
   and endorsement credentials.
   - *Interoperability and Trust Protocols:* The importance of
   interoperability and the role of protocols like DIDComm and trust protocols
   in enabling seamless communication.
   - *Linux Kernel Project Application:* Use case of the First Person
   Project for enhancing the Linux kernel's web of trust for developer
   contributions.
   - *Verifiable Trust Communities and Networks:* The concept of structured
   ecosystems for issuing and managing credentials.
   - *Future Development and Resources:* Information on ongoing work,
   available documentation, and task forces within the Decentralized Trust
   Graph working group.

------------------------------
Key Points

   - The First Person Project and the Decentralized Trust Graph working
   group are rapidly developing standards to address the proof of personhood
   and agenthood challenges.
   - DIDs and Verifiable Credentials are the core building blocks, with a
   focus on self-certifying DID methods.
   - Verifiable Relationship Credentials (VRCs) are crucial for
   establishing direct, cryptographically verifiable links between individuals
   or entities.
   - The concept of "agenthood" allows AI agents to have verifiable
   identities and relationships, controlled by a human or organization.
   - The project aims to avoid global biometric databases and prioritize
   privacy-preserving solutions through technologies like Zero-Knowledge
   Proofs (ZKPs).
   - Interoperability is a key goal, with efforts to define standard trust
   protocols and develop test suites.
   - The Linux kernel project's existing web of trust is a significant
   early use case for these new technologies, aiming to modernize and secure
   the contribution process.
   - The development of Verifiable Trust Communities and Networks is
   essential for scaling the issuance and management of credentials.
   - The project recognizes the need for human-readable data alongside
   machine-readable credentials to enhance user experience.
   - The DTG working group is actively developing a robust glossary and
   bootstrapping documentation to clarify concepts and guide implementation.
   - Collaboration with other initiatives, such as the Seros project and
   Dubdub wallet, is ongoing to promote interoperability and adoption.

Text:
https://meet.w3c-ccg.org/archives/w3c-ccg-ccg-atlantic-weekly-2026-01-20.md

Video:
https://meet.w3c-ccg.org/archives/w3c-ccg-ccg-atlantic-weekly-2026-01-20.mp4
*CCG Atlantic Weekly - 2026/01/20 11:55 EST - Transcript* *Attendees*

Benjamin Young, Brent Zundel, Dmitri Zagidulin, Drummond Reed, Erica
Connell, Geun-Hyung Kim, Greg Bernstein, Gregory Natran, Harrison Tang,
Ivan Dzheferov, JeffO - HumanOS, Jennie Meier, Kaliya Identity Woman,
Kayode Ezike, Mahmoud Alkhraishi, Otto Mora, Parth Bhatt, Phillip Long, Rob
Padula, Ted Thibodeau Jr, Will Abramson
*Transcript*

Drummond Reed: says, "Dr. for some reason opened the browser." So, I'm
going to rejoin via the Google Meet app. I'll be right back.

Mahmoud Alkhraishi: Hello We're going to be starting in three minutes.

Mahmoud Alkhraishi: All right, looks like we've had people joining us
tapering off. So, let's just get started. thank you everyone for joining
us. It's January 20th, and welcome to the CCG call. As a reminder, we have
a code of ethics and professional conduct. Please make sure that you review
it and you adhere to it. We are quite happy with how everything has been
going recently and we would love for it to continue. IP note, anyone can
participate in these calls. All substantive contributions to the CCG must
have signed the full IPR agreements. And do we have any announcements today
before we get started?

Mahmoud Alkhraishi: Does anyone have anything they'd like to share? All
right. hearing none, Drummond, would you mind if you just quickly introduce
yourself and what you're going to be talking about?

Drummond Reed: Yeah, Happily. Can you hear me? Just double checking to make
sure my sound's good.

Mahmoud Alkhraishi: Yes, we hear you.

Drummond Reed: Very happy to be here. sorry I only occasionally am able to
make CCG calls. I try whenever I can and I do listen to a lot of the
recordings because this is an amazing amazing group. It always has been. so
as of this year I think it's 34 years working in this space. I know that
sounds like a very long time but it's been a very long journey. if folks
are familiar with the internet identity workshop event that happens every
six months. The next one is number 42 in April and I've been to every
single one of those. so we're going on the end of 21 years. yeah, there's
Kalia right there.
00:05:00

Drummond Reed: who has also been to every one of them. and I have to say it
is not only the most amazing event that's help driven the whole way forward
but it's totally infected all the events that I try and organize now I
lobbyed it to OpenSpace the way I've learned it at IW. so that's a plug for
that event and the other IW inspired events that are happening. Kalia has
probably shared those or can put them in the chat because there's DICE is
coming up again I think in June if I'm remember correctly. Anyway, been all
those and helped author a book on self-s sovereign identity in 2021.

Drummond Reed: was a co-editor of the W3C DIDS spec. thank you. it's I must
say I'm going to talk about DIDs a lot today because DIDs are the very
heart of the subject I'm going to be talking about what we're doing with
firstperson project and the decentralized trust graph working group which
I'm going to say right up front is a joint working group of trust and the
decentralized identity foundation diff both of those organizations as
you're probably aware are u

Drummond Reed: under part of the Linux Foundation. Trust RP is now actually
a project under LFD decentralized trust and decentralized identity
foundation is its own standalone project. We collaborate a lot and on this
particular Decentralized Trustcraft working group. we're a joint working
group. We have a bunch of folks from both organizations. and it's and I'll
say right up front what I'm going to talk about. This is the fastest moving
standards effort in the history of my 33 years in the industry. It is I
mean things like trust and diff are emerging standards organizations like
CCG we can move for pretty fast compared to the processes of a full W3C
working group or ITF working group or ISO or that kind of stuff. but this
is just going at blazing speed because there's huge interest in this topic.

Drummond Reed: so that's a prelim. if there are not any questions about
that, I'm happy to dive in and share an update to the last time we were
here, which I think we were mostly talking about IRA and trust registries
and sort of the birth of the first person project. and today I'm ready to
go much deeper into it if that's what folks would like to Cool. then I will
share my screen if everything works properly here. I have to go to it is a
Chrome tab but I've got to pick out which one should be that one All right.
Hit share on that. And Go to full screen. One second there.

Drummond Reed: That's interesting. That's how it goes to fall. is this
showing? Okay. You can see the screen well enough.

Mahmoud Alkhraishi: Yes.

Drummond Reed: All I have fair amount of content to share here. I'm happy
if it's not going to be easy to see the way it's displaying right now. I
won't see the hands or comments. So, please just interrupt me if anyone has
a question as we go along and hopefully should be plenty of time for
questions at the end. so, I'm going to drive towards explaining how the
first person project and first person identity as people refer to it
ultimately applies to AI agents. which is obviously a very hot topic and
one that has become very relevant to what we're doing, the first person
project.

Drummond Reed: but in order to do that I first have to explain are we
actually doing the first person project so I can understand why it's
relevant in that way and that's what I'll try and do as quickly as I can.
So I always love the name of this thing and I put this right up front. if
you want a copy of this deck, it's a Google slides deck available to
anyone. just grab that right now. In fact, boy, I'm suddenly thinking I
hope I made the deck public. if for any reason that doesn't work and I'd
forgotten to make it public, I will do that. I'm pretty sure I did. or
someone could just tell me and I will do that. Anyway, I have other QR
codes in the deck itself. You can always snap those directly, but if you
get the whole deck, you get all of this stuff. And I'll say right up front,
a lot of what's covered in here is covered in much greater depth in the
FirstPerson project white paper that we put out last September.
00:10:00

Drummond Reed: we've done one new version and we're working on the second
one. It should be ready later this week. we're just updating it as the
space evolves and this next update will have several updates related to
what I'm going to cover here today with progress in the decentralized trust
working group. which I'm going to abbreviate in this DTG if you hear me say
that in the rest of the presentation. DTG is decentralized trust. Very high
level. what are we all about? this is our one slide description.

Drummond Reed: what is the main thing we're doing here is trying to come up
with an answer to this question the whole problem of proof of personhood
and what happened was once and I'll explain how we got started down that
road is once we looked at the overall solution of decentralized trust graph
we realized that we were also laying the foundation for this second problem
how do you prove that a personal AI agent is acting on your behalf as a
real person. So, as you'll see, that's led to the idea of agenthood and,
I'll talk about that's where I'm driving with the whole thing is to talk
about agenthood. And this all originated, not at one, but across work going
on at all four of these different projects at the Linux Foundation. the one
I haven't mentioned so far is Open Wallet Foundation.

Drummond Reed: That's where some of the relevant code digital wallets are
and credentials the heart of solving this. So all four of these are
involved but this is not just a Linux foundation thing either. one of the
reason I love being here at CCG is you're working on and have been working
on key pieces of the puzzle as is W3C. the active discussion on did cell if
it's pronounced that way CL cryptographic event log that's a particular
approach to self-certifying identifiers which we absolutely love at trust
of RP we have a task force called bidskid for self-certifying identifiers
so we strongly believe that's the right direction and that's what we're
planning to use in the first person project so many others

Drummond Reed: folks are going to be involved. But I just sort of
originated here now. why is the Linux Foundation the first customer? I want
to explain this because it explains a lot about how the project's evolved
and where it's going. And this is Jim Zlin giving the keynote address at
the Lim Foundation member summit last March. the next one's coming up at
the end of February in the same location the Silverado Resort in Napa,
California. but you can see the title of his opening keynote there. and we
knew he was going to talk about this but I was sitting in the front row and
we had a workshop planned that he was going to be leading the next day on
first-person credentials. We didn't realize he was going to devote his
whole keynote to that topic.

Drummond Reed: He started with the story of the XZ attack which if you're
not familiar with it, I highly recommend this Wired magazine story. It
basically became very close to being the worst malware attack ever. because
it was on a core utility of the Linux DRO and had it been successful, had
it not been detected by a ciduous developer at Microsoft, it would have
been the worst backdoor, distribution ever. And this scared the pants out
of Jim and the Linux Foundation, the projects there. And it's one of the
reasons they said, "Hey, we need to turn Hyperledger to LFD decentralized
trust."

Drummond Reed: and this was his next slide. He then turned around because
he'd been briefed on first person project for the last couple months said,
"Yeah, we need to do this." And these are and then he went on to say we'd
given him this slide. This is part of our deck explaining what we're doing
and I'll talk more about this later and then he concluded why should we
start with open source projects to invest in this kind of infrastructure
and he had a very impassioned set of reasons these are all just slide
pictures I took with my iPhone of his slide sitting in the front deck and
he felt that open source has these values permissionless entry and
worldwide participation that are super important and if they start to get
eroded either
00:15:00

Drummond Reed: by malware or by the AI agents now being used for a lot of
coding jobs and contributing directly to repos. If they started to degrade
the trust, it could be an existential threat to the entire industry. So he
not only on this slide made it clear where he wanted to start, he was
explicit. He wanted us to start a first-person project which is all
volunteer at that point has been up until literally a few days ago with the
Linux kernel and my jaw was on the floor at that point. It's like what he
wants us to start with the most valuable open source project in the world.
Turns out there are good reasons for it which I'll talk on a little bit
later.

Drummond Reed: And then this was his last slide that we had again part of
the deck we'd used to brief the LF management team. To successfully solve
this problem, we not only need capabilities in wallets, we need a
particular family of credentials that I'll talk about today and systems
adopting this. in fact, we've developed a term that I'm going to use
throughout this presentation called a verifiable trust community. And
that's a very specific kind of ecosystem that participates on the
decentralized trust graph. So we need all three of these. And this through
line we drew says and we must have interoperability. we need a solution out
there that does not face the interop problems that we have in so much of
SSI today.

Drummond Reed: we've made a lot of progress, a lot of pieces, but those
pieces don't fit together into something that really scales and has strong
network effects. And we feel that at least in this area, we can solve that
problem if we can get all three lined up. So, again, I'm happy to at these
chapter headings stop and Tell me if there are any questions that have come
up something that someone wants me to address. If not, I will go on to the
next part. All right. So, what's the answer? Yes, this is a proof of
personhood problem. and as long as I've been in this industry, I think it
is the oldest and hardest problem Our whole motivation was to solve it
without using any form of global biometric database. which meant not using
one of these.

Drummond Reed: And if you don't recognize that I'm not going to say
anything further. It's just a particular effort in the space that has
privacy implications that just have scared the pants out of a bunch of us.
but the one thing I can say is it did massively what it represents is the
tremendous interest in as Genai takes off so hard it's put a huge spotlight
on the proof of personhood problem and said we have to solve it if we're
going to be able to distinguish between humans and AI agents between human
AI generated content we need a solution and the fact

Drummond Reed: that Sam Alman at OpenAI is the co-investor of this project
and the orb tells you how important it is to that group but we need a
solution that doesn't use that and turns out the heart of that solution was
in this wonderful paper that I don't know how many folks on this call here
were actually co-authors I can't see the list right now but I know that a
number of

Drummond Reed: that are active in CCG were contributors to this paper. just
as far as I'm concerned changed the game in terms of proof of personhood
when it came out. the folks in the yellow highlights were authors of the
paper that attended DARPA had a personhood workshop in Orlando February of
last year, so just under a year ago. and those four people Stephen Adler
gave the keynote there on the whole premise of the paper which you can
summarize and I highly recommend at least reading the executive summary.
It's about four and a half pages has a great infographic but in that
executive summary it really says it comes down to these two key elements.

Drummond Reed: to verifiable credentials, zero knowledge proofs, and if
designed to do what that paper said, then we could get there. I don't need
to talk to anyone here about the trust triangle, the other upper half of
this what at trust or pee we call the governance diamond which you often
need to scale it. I will point out that scaling usually requires some
solution to what is often a trust registries or trust list. It's not the
only way to do that, but it is a widely implemented way. At Trust IP, we've
been developing the trust query protocol for four years. It's just
finishing its public review for 2.0.
00:20:00

Drummond Reed: So, we're very very bullish on that solution being able to
scale verifiable credential ecosystems, digital trust ecosystems. so the
essence from the standpoint of these credentials of what the PhD paper I'm
just going to use that initials for personhood credentials comes down to
this. every verifiable trust community that adopts governance to say we
will issue those credentials exactly one per human in our community.

Drummond Reed: that's the essence of what PhDs do and the paper does not
say how do you go do this. It doesn't have schemas for person with
credentials and it doesn't have a governance system or a design for a
network of issuers to do this. but that is what the paper basically says
this is what we think is needed. why these are the potential risks that
need to be addressed and mitigated and we're hoping folks go out and do
this and that's what the first person project was all about. the reason it
took off starting really is because over at trust IP which started in 2020
we had been working on call it related aspects of the problem.

Drummond Reed: So when that paper came out, we already had an effort going
around in the direction of proof of personhood. And what we saw was that
personhood credentials were one of a family of verifiable credentials that
could be used to build what we call a decentralized trust graph. all three
of those words it is a raph very much like a social graph. However, they're
about trust relationships, not social relationships. And the key is can we
make it decentralized? There is no centralized root node. It is like the
internet or arguably even more decentralized than the internet. because
it's all bids at the core. So our perspective was that in addition to PHC's
there was a second fundamental new type of credential for peer trust
relationships.

Drummond Reed: And they're actually pairs of credentials that we call
verifiable relationship credentials or VRC's. And since this is the heart
of what makes up the decentralized trust graph and what will power this the
first person network I'm sharing this we had several sessions on this at
the spring the April IW of last year and Phil Windley who is a co-founder
of IW wrote this great blog post that really goes into a lot of more detail
than what I cover here today. So, I just wanted to highlight that.

Drummond Reed: but quickest my favorite way to describe what are you really
doing with first-person credentials and I mean with verifiable relation
credentials and why this is particularly relevant not to the Linux kernel
project is the way that Jim Zlin put it in his keynote address at the Linux
Foundation member summit last Jim characterized it this way. They are the
ultimate instant key signing party. the whole idea of key signing parties
emerged with Phil Zimmerman and PGP I guess we're talking 30 years ago now.

Drummond Reed: And the Linux kernel today still it's now GNU privacy guard
is the GPG implementation of PGP and the Linux kernel has roughly 65
developers and to become a direct contributor to the Linux kernel your GBG
excuse GPG keys must be signed by two other members of that web address.
00:25:00

Drummond Reed: It is a classic web of trust. It's all based on the GPG code
that apparently is not getting very well maintained. It's a manual process.
There's one person on the Linux kernel team that works for the Linux
Foundation that has to maintain that. and so what they saw with what we're
describing with first person credential decentralized trust graph was a way
to modernize this whole thing, automate it and make it basically even more
secure and more privacy preserving. so I'm going to show you the exact
slides. once he used that analogy, in his opening keynote, we created the
following slides. We actually created animated versions of them. I'm not
going to do that. We don't have time here today, but I'm going to show you
exactly how that works so you understand the core DNA that we're after.
this is part one of the two parts.

Drummond Reed: and in this particular case, we're showing a person-toperson
relationship in a ceremony that is essentially the same thing you would go
through if you're going to form a contact on LinkedIn or WhatsApp or Signal
or Telegram. in fact, the only popular chat app that doesn't support R
codebased contact or relationship formation is iMessage because Apple wants
you to do it with their bump whatever that feature is but everyone else
does it with QR codes.

Drummond Reed: And whenever you're doing that with one of those apps on one
of those networks, the connection you're forming is on that network, I
can't tell you how many people I tend I use it all the time. I form a
signal connection with someone and then I need to send them a calendar
invite, And I'm like, okay, what's your email address? it's a
networkspecific connection. What we're talking about here is a wallet
towallet or we tend to use the term agent wallet because we need to talk
about the functionality wrapped around the wallet. So that will end up
being directly between Bob and Alice with no inter intermediary no specific
network. It is literally owned by the two of them. how do you do that? Of
course you do it with ds and did doc exchange.

Drummond Reed: In this case, Alice shows the QR code to Bob who scans it,
says yes, I want the relationship. Bob's wallet has either generates a key
pair or has pre-generated key pair. we're recommending a self-certifying
identifier. So, it can generate the associated doc and share that back with
Alice at the network address that she shared. And of course, be could be
whatever to get that back to Alice. She verifies that and Bob's signature
on that and then she does the same thing in and to reciprocate with What
they have done there it's just a key exchange and did exchange but they've
created a new private channel with pairwise on either side that they can
now use for anything any kind of secure private confidential communication
that they want to make between each other.

Drummond Reed: that does not yet set up It just sets up this channel at the
top you see in pink. Now we're going to do the verifiable credential
exchange which is also probably pretty straightforward. So first once
Alice's did dock is back and verified. Bob's agent will create this. This
is very simple blueprint. we now have actual schema proposals in the
decentralized trustcraft working group but the essence of it is the pair of
ds a date stamp and a signature that's a verifiable relation credential
that Bob creates and issues to Alice verifies the signature everything's
good she does the same thing to reciprocate to Bob checks that signature
now they have just exchanged this is the end of the key signing party

Drummond Reed: because they now exchanged signed credentials for of each
other's dits. That's the essence of a VRC. And that gets us partway into
the story. I have I think two or three more chapters to go. Again, just
going to stop and see while I'm on this. Are there any key questions or
burning issues around this? Again, I can't see the hands chat. No, that's a
very good question…

Otto Mora: Drummond, who says that Alice or Bob are humans besides they
themselves asserting it? is there a root prior to that or is this just over
time you build up enough of these where it becomes undisputable that is a
person?
00:30:00

Drummond Reed: which leads right into this slide.

Drummond Reed: So what we saw sort of the big a for us that were working on
this at trust over AP when the person with credentials paper came out we're
like it's not one or the other it's both what you get if you think of this
as you're building a graph okay and you're building a graph where there
essentially from the standpoint of a trust standpoint the root nodes are
any issuer of a personhood credential right anywhere

Drummond Reed: literally obviously any professional association, any online
group even but that actually says we have governance such that others can
rely on the fact that we issue personal credentials according to the
requirements in that paper and again I refer to that 63page paper as going
deep into what are the actual crimes we're doing. But it just comes down to
those issuers are the ones that establish both it's a real human and it's
unique in their scope. It's not globally unique.

Drummond Reed: So I think the average person will end up with I don't know
it could be at least a dozen personhood credentials from different
community verifiable trust communities they're part of right a company a
university a school obviously government once we get to that point although
a notary could produce a personhood credential on behalf from a passport or
government ID document if you trust that notary to be in that THC issuer
role.

Drummond Reed: So it's that credential that produces the proof of
personally being unique and then VRC's are only counted towards a trust
graph if you can produce a ZKP proof that you both have personhood
credentials and that's what makes or the unique personhood credential in
this community that Bob and Alice issued means they can have one verifiable
trust relationship. They can't just create, a thousand VRC's to try and
They have a thousand relationships because they can only prove one
relationship with the PHC in that community. Does that help answer your
question?

Otto Mora: So I guess knowing who the issuer of that personal credential
matters I guess or has some weight to it, right? One university may be more
reputable than another and a person may be more reputable than others.

Otto Mora: The CKP seems to be like more I have enough of these from a
given set of people.

Drummond Reed: Yes. Yes,…

Drummond Reed: that is exactly and they talk about that in the personial
paper that the ZKP is how you don't have to reveal what relationships you
have, but that you have up to a threshold of either PHC's or verifiable
relationships within those PHC communities. we cover that in more depth in
the first person project white paper. but that ZKP capability is critical.
I don't have any slides about it, but if folks are familiar with the
SiOros, ation New Swedish Foundation founded just under a year ago. that's
developing the Dub worldwide wallet.

Drummond Reed: and to meet the EU standards and once as I understand it's
already six member states have committed to certifying that wallet. Leaf
Johansson recently was announced as the new executive director for Seros.
He is committed and we're already collaborating with him on getting to a
ZKP architecture that will support this. they want to be able to use the
same thing for the EU DID credentials. So that ZKP is a really key piece.
It's one of the remaining hard problems in the space. Anyone on this call
that's interested in that, please feel free to get in touch with me because
we're trying to get sort of critical mass together around that problem. But
yeah, that is a really key piece of it.

Drummond Reed: And to your point, how do you actually scale the issuers
that do meet those requirements that you can rely on? That is what we call
verifiable trust network. And that's exactly what the first person project
has spawned the first person cooperative to develop the first person
network. And that network is a network of these issuers that will meet
those governance requirements. it's taking what's in the personal
credentials paper and saying, how do we actually make this a real thing
that can scale? that's a hard problem we're working on.
00:35:00

Otto Mora: Hello.

Drummond Reed: All I want to make a couple last points.

Drummond Reed: So once we started the work of the decentralized trustcraft
working group which launched last September like I said things have been
moving really fast and clarity's been coming in several areas a little
which I can show you and otherwise you can get pointers to everything else
we've got either between the first person white paper or the decentralized
trust graph repos. But first thing I want to talk about is we realize there
are a couple essentially categories of DIDs. They're not different methods.
we think all this can be done with self-certifying DID methods is what
we're recommending and did sell may end out.

Drummond Reed: I love the fact that the did sell and did webv dialogue is
going on so robustly right now because there is going to be I think the
successor to did web that's actually both secure and very scalable and very
decentralized. But regardless of the DID method there these different types
of DIDs and the DIDs we talked about before we call relationship DIDs. the
ones that Bob and Alice exchanged that are just used to-peer. They're not
intended to pro any correlation at all. But of course, you need to have
what we call intentional correlation in order to prove you are within a
group or across groups of any kind of level trust communities.

Drummond Reed: So for that we said we need to really think about not just
key management but did management in what we call sovereign wallet. And so
this bottom category of relationship did or dids for short those are the
ones that are automatically created and used in every relationship you
create on the decentralized trust graph. And as I said, they won't just be
verifiable trust community. We'll get to person to agent. but when you join
a community, when you need to be able to show I am a member of this
community and you can recognize me as a member of that community, that's a
second category we call membership ds or mdids.

Drummond Reed: And when you have joined, you get a person withhood
credential. That's when you're sharing an M did with that community. and
the other members of that community can recognize you by That is
community-based correlation. Then of course you go all the way up to all
right I want to have a persona that I control where it's shared. It might
be a private persona that I only share in certain circumstances or a public
persona that I have as a blogger, an artist or any form a politician, right?

Drummond Reed: anything where you're saying I need to have a public persona
as I might have for instance LinkedIn or blog or a social network but you
can have again as many as you want and it's important because these are
based personas they can be synonymous you can take an artist like Banksy
and Banksy would be able to digitally assert and sign his works without
having to share while Sting's pseudony anonymous. So we've recognized we
have these three core, basically uses or categorizations of DIDs that can
all be the same DID method behind them. It's how it's being used and
managed in your sovereign agent, that gives you this persona control. And
now I'm going to get right down to where we've gone in the decentralized
trust group.

Drummond Reed: This is a diagram from you'll see it in what we call the DTG
glossery that we're creating. That's a QR code if you just want to go
straight to that Google doc that we're working on. it's going to go into
GitHub shortly. We're just developing it as a Google doc. And you can see
we've got these three categories of credentials. So this first category
these we call the edge credentials because they define the actual edges in
the decentralized trust graph and as we talked about verifiable
relationship credential that's what uses our S verifiable membership
credential is how you prove your members. So what happens is a PHC is a
specific kind of Mid.
00:40:00

Drummond Reed: it's a verifiable membership credential issued by a trust
community that is trusted to issue a person with credentials. What we
realized as we were doing this is you can have other kinds of verifiable
trust networks that have other requirements for membership and personhood
credential network It's a very important kind but it's just one kind of
that. So there are many other uses for a decentralized trust graph. So
these define the edges in the graph. These next category are annotations on
those edges. And what we realized is that persona management is an
annotation. Once you have a relationship you can share and that's what we
call the persona dids are for. it's a separate credential.

Drummond Reed: So, I could form a relationship with, Otto, for instance,
and then say, "Hey, Otto, we're having great I want to pull you over into
some, political discussion. I could share my political persona with Otto
and he could decide not to share other personas of his. So, those now can
be managed as separate credentials. you can say the UX is not trivial but
there are already folks that are working on that. So that's where the
petids come in. Now the last credential that I'm going to talk about I
don't have time to go. Invitation credentials by the way are how you
actually grow a trust community by members inviting other members if you
choose to do it that way.

Drummond Reed: the last one I'm going to talk about is verifiable
endorsement credentials because the decentralized trust graph by itself is
not a reputation system right it's just a trust graph but if you want to
add reputation you can do that and that got the name this is wrong that's
supposed to be verifiable endorsement credential but I was creating this
slide last night and popped in I'll fix

Drummond Reed: that verifiable endorsement credential and this is what that
looks like if you take this again this is just example of the same way Bob
would issue a VRC to Alice now that uses art is as I pointed out that's
just a private pair wise okay we have a relationship that's just between
the two of us but if Bob and Alice exchange personas so that if Bob issues
a verifiable endorsement credential to Alice it's actually from a persona
of Bob's that can be verified by whoever she wants to show that to and it's
issued to a persona of Alice's that Alice wants is willing to take those
endorsements against. This is an extremely simple form of reputation called
vouching. I was involved in a social vouching project about 15 years ago
that this actually proved to be very viral.

Drummond Reed: as soon as you get a reputation there's all kinds of
challenges. So proposing there's no global reputation system here. This is
just a type of type of a mechanism for cryptographically verifiable
endorsements that can be used within a verifiable trust community. One of
the reasons we illustrated here is guess who wants to use that starting
with the Linux kernel project. They want developers to be able to vouch for
other developers as an enhancement to the web of trust they have today. So
I think it's not actually a credential type. One more thing I want to talk
about before I get to agents and that is all these things going back and
forth between Alice and Bob right now. They're all machine readable data.
These are to Wallace. there's no real human friendly content in there.

Drummond Reed: And of course, you need that when you connect to someone
else on a network. I love it when you connect on WeChat, because so many of
my contacts there are in Chinese. They have a ceremony where the first
thing you do is you type in, name and a couple other human friendly
addresses so who you've made your connection with a decentralized trust
graph and first person credentials, we can now automate that process in
sharing something that does not have to be a credential. It's simply what
we call a verifiable data structure. It could be and there's already a
proposal to just wrap the arc card in a verifiable credential. But in any
case, it can be shared by Bob with Alice and of course vice versa.

Drummond Reed: as the third step, you share the digs, you establish the
VRC, and then Bob and Alice choose one or more RC cards that establish the
information they want to share. Of course, they can be associated with the
personas that they want to share. So, again, one of the reasons we think of
it as a verifiable data structure is it's dynamic. as they change. These
can all be essentially subscriptions and you can just see pro protocol
message from agent to agent. Here's an updated arcart, it's slots right in.
We'll finally have the self-updating address books that people have talked
about for years.
00:45:00

Drummond Reed: All right, I'm going to wrap up with the last piece is okay,
now that you understand hopefully what first person identity is about. that
people use that term. I'm like it's really, as much decentralized trust
graph presence as anything else. let's talk about How does the model apply
to AI agents? And it's really pretty straightforward. as important it is
for a person to have cryptographically verifiable relationships between
each other and with communities that can happen with AI agents and what it
looks just the same way this is literally the same diagram with a few names
changed because establishing that relationship that's again
cryptographically verifiable both parties can prove that to any other party
they have this relationship this does not tackle

Drummond Reed: Okay, how do we actually delegate what that agent can do?
That's a whole another subject. But the agent now has identity. It has a
verifiable relationships and a controller that can prove that they have
control of that agent. this has been one of the major things that folks are
going. Okay, now we have a way that we can have people proof of personhood,
privacy preserving identity and agents with agenthood and proof of who is
in a control position and that's what folks are excited about. So I will
wrap up here just by this is my epic slide. I wanted to quickly show you
that there is a company in the space I don't know how active they are in
CCG called Affinity. they've been in the SSI space for a long time.

Drummond Reed: this is a diagram that they've produced showing how they see
this whole process of agthood working with the idea that in this gray box
you've got a AI infrastructure provider often called AI agent provider who
says yeah I provide AI agents in this case to enterprise customers but you
could do a similar version of this for individuals and that they envision
the process this way. The enterprise says, "Hey, I want an AI agent to be
provisioned." They go through a provisioning process and the agent receives
both the DIDs we talked for identity and the credentials about its
capabilities. And once that is provisioned, the details go back to the
enterprise.

Drummond Reed: The enterprise then together with the endpoint to
communicate with the agent. the enterprise checks that in step three here
says show me your credentials and the agent responds back with the
credentials. The enterprise next says okay I'm going to verify those
against the trust registry of agents by that agent r. Everything checks
out. They verified it. the enterprise says, "Okay, I know you're a valid
agent provisioned by this provider. I'm now going to issue you the
credentials you need to operate on my behalf." And once they've done that,
then now that trusted agent is registered in their own trust registry as an
agent that can act on behalf of that enterprise.

Drummond Reed: So you could see how this whole thing of agenthood fits
right into agent workflows. And Affinity, I've already seen the app. I'm
going to see a new version of it next week. they have an app. It uses for
all of these communications. And the cool thing is in that app can interact
with humans and agents in exactly the same interface. you can create groups
of any combination of humans and agents. and it's not theoretical. It's
working. I think they're going to have it on the market later this year.
And in fact, they're going to show a version of it at this event. That's
the last thing I'm going to share with you at the first event that I'm
aware of that's focused entirely on u personhood and agenthood.
00:50:00

Drummond Reed: It's the day before the Linux Foundation member summit which
is 24th and 25th same location Silverado Resort Napa California. I don't
have a QR code but if you just search summit on human agency you'll go
right there and it is the Linux Foundation member summit which is only
available limit members it is you have to apply if you're interested in
this topic and you're available I strongly recommend it. We got an amazing
set of speakers that have been lined up there. Clay Shery is going to give
the keynote. Jim Zamlin's going to give it a keed up. So, last thing I'm
going to say is just if you're interested in any of this decentralized
trough graph working group, we started these actually one other task force
on risk assessment harms prevention, but these are the task forces we're
working on. that's a QR code to go to the homepage for that working group.
I have another one for the first person project white paper.

Drummond Reed: And then lastly for we have mail list and that is it and I
guess we have about 10 minutes for questions.

Mahmoud Alkhraishi: Thank you, Drummond. Any questions from anyone? T.

Ted Thibodeau Jr: Yeah, I'd just like to get that slide deck link in the
chat as a URL.

Ted Thibodeau Jr: QR codes are great, but they're not as easy as everybody
wants them to be.

Drummond Reed: You've got it.

Drummond Reed: Give me just a second and I actually can double check and
make sure this is public. don't let me fix this right now. because yeah,
typical I made a copy of this deck and forgot I'm making it wide open right
now. In fact, I'm going to make it and the comment capability. And here's
the link. And I'll put it in the chat. One second. Here we There you go.

Mahmoud Alkhraishi: Auto. I think a lot.

Otto Mora: Yeah. No, congratulations, Drama. Amazing work. I mean, I could
see so many good things coming out of this. Especially love the mention of
the biometrics heavy project that will not mention here, but that I agree
is very harmful out there. also I had spoken to Jeff Turk about this and if
you guys want to collaborate with us at diff we have this community schemas
repo which if you want to host your schema there you're welcome to do it
and I think would be great as well. And we can also talk about
standardizing the members in the credential schemas repo perhaps in the
future which I think would be really cool as well.

Otto Mora: But also just wondering so in the Linux Foundation type of
example you have enough of these Linux core developers let's say that
there's a trusted circle of Linux core developers maybe 15 of them would I
need to have let's say at least five or let's say three of those Linux core
developers giving me that backing of you're a trusted developer you're okay
to commit changes into the Linux kernel core. how would I know that I have
a credential from that set of limited people,…

Otto Mora: trusted people versus just any person or is that part of the set
KP details?

Drummond Reed: It's …

Drummond Reed: it's such a great question. I'm putting in links to two
active they're currently Google Docs just because they've been evolving
very quickly, but then they're going to be going into the DTG credentials
task force repos and one is the glossery of the terms I was using. We found
that we need a pretty robust glossery to be very specific about things like
verifiable trust communities, verifiable trust networks. but the second one
auto is once we had sort of worked out what the Lego blocks were that set
of seven credentials you saw there.

Drummond Reed: the test could we explain step very very precisely exactly
how verifiable trust community bootstrap itself would start up right and it
wasn't an abstract process because the folks asking the questions were the
ones working on the Linux kernel project it's called the Linux kernel
maintainer verification project LKMV they were saying okay we got the
credentials they've actually been implemented they've been following the
schema work
00:55:00

Drummond Reed: and implementing them in Rust and they're okay but now we
have to give instructions to the developers working with the person that
current currently maintains the GPG web of trust and they're saying okay
how do we actually bootstrap this thing so we wrote this document it's
about 15 pages it just goes step through four phases of how you grow a
community now that is explicitly we put in a big note it's

Drummond Reed: web of trust model but we explain all communities follow
their own policies so your question of how many relationships do you need
to qualify for things that's up to the community you see what I'm saying
the rules in a corporation small or large veus cooperative versus an online
social group it's all policydriven

Drummond Reed: And the building blocks of the graph are the same. This is
where we're going, it's ds to the core, but how you turn around and make
decisions about trusting or membership or that's all based on your own
policies for building up the community and then what proofs you want
against the trust graph and the reason for ZKP is to allow those proofs to
be privacy preserving when they need to be. that's the point that I think
the person with credential makes so well is if you're going to standardize
on how you can have those credentials, you absolutely have to have them to
be privacy preserving. but in certain communities, of course, as an
employee in a company, you're going to need to be identify yourself in many
cases as an employee as but that's something that's always if you have ZKP,
you can always reveal the data. You just don't have to reveal the data.

Drummond Reed: So I highly recom I love by the way you can comment on those
documents. this is glossery and the bootstrapping process are great ways to
really wrap your head around this stuff.

Otto Mora: Awesome. Thank you.

Phillip Long: Drummond. Yes,…

Drummond Reed: I think Phillip Yes.

Phillip Long: Drummond. Nice to hear I'm still a little con. You were
talking about obviously the importance of the interoperability of these
various components. And the question that I'm not clear on is it looks as
though there's a bunch of services that the wallets that you're talking
about that manage these particular kinds of credentials are going to need
to have in order to take advantage of them. And I'm not clear on what are
the minimum protocol requirements that the wallets needs to have to
exchange things. is DIDCOM the framework that you're using? And secondly,
in order to use them what are these additional services that are presubly
con contemporary wallets for verifiable credential management,…

Phillip Long: for example, likely lack?

Drummond Reed: absolutely excellent question and…

Drummond Reed: you're quite right. The next stage as we want to get out the
DTG credential spec and get that into working draft and implementation
draft our goal is to do that this quarter because as I said there are
already implementations so we want to get squared up there. The next step
will be what at trust over P I know we call trust house protocols can run
over any transport that will carry them. deadcom is currently the default
and being used out there and of course it is a major product of diff and
folks like affinity are using it and scaling it very nicely and there are
many others in that space that are doing that.

Drummond Reed: They're not the only ones. at Trust IP, you're probably
aware we've been working on the trust bending protocol. Lot of call it
overlap or similarities. it's …

Phillip Long: They change.

Drummond Reed: a different layering than didcom, but in the end they both
accomplish the same thing. did confidential exchange. So trust protocols
all use that private channel and you're absolutely right.

Drummond Reed: There are certain trust house protocols and that's the next
step that's in the charter for the DTG working group to say here's the
trust house protocols and the key thing we'll be after especially the first
person project and the first cooperative is interoperability test suites so
that if a community says we want to join we're going to say that's
fantastic you've got the governance now make sure that you have your trust
registry you pass the owner for the test suites just like it works with
anything else that you want to scale a network effect so, we've got a lot
of work in front of us.
01:00:00

Drummond Reed: We're only just started down the road, but that's the next
stage of what we'll need to do, Phil.

Phillip Long: Got it.

Phillip Long: So, we're in the process of architecting a credential wallet
for the US Chamber of Commerce Foundation and a web wallet. And the
question, I guess, will be how soon is enough detail available to consider
that in the design work that will start in the next couple of weeks
actually.

Drummond Reed: Hopefully happy to have an offline discussion about that
just to see,…

Drummond Reed: how quickly things can line up. I know, for example, I was
only exposed to the Seros project and Dubdub wallet, their effort starting
at the last IW. but they are super leaning into those same things. if Yeah,
definitely. org is again I wasn't aware of them until IW, but the only
wallet I'm aware of that's already essentially as as of IW six member
states that said we're going to certify that wallet. So they've got some
really good innovative features and…

Phillip Long: Mhm. We need to look at them.

Phillip Long: Thank you.

Drummond Reed: we're going to collaborate with them on the ZKP architecture.

Drummond Reed: So, anyone else who's interested in that, definitely get in
touch with the Seros folks. and by the way, anyone interested in anything
about the first person project, as I said, there's the main list. I think
there it is. I put the link in for that as well. And, we have established
First Cooperative is still fledgling, but we're going to start growing it
up. We've just got our first tiny bit of funding for it. we hope to get
more funding going into Q2. so I happy to come back and…

Drummond Reed: provide reports as often as you want to have us Thanks so
much.

Mahmoud Alkhraishi: Thank you,…

Mahmoud Alkhraishi: Thank you everyone for your questions. I'm just going
to jump in here just because we're at time. this was an absolutely
wonderful presentation. Very appreciated and I mean, I guess drums dropped
in some places where you can reach out to him and please feel free. Thank
you everyone and talk to you all soon. Have a great rest of your day.

Drummond Reed: Thanks everyone. You bet. Bye-bye.
Meeting ended after 01:02:46 👋

*This editable transcript was computer generated and might contain errors.
People can also change the text after it was created.*

Received on Tuesday, 20 January 2026 23:58:00 UTC