Welcome and Introduction (5 mins)

SCITT Overview (10 mins)

AJ Stein: The diagram has that we have 2 organizations doing a
transaction, but we don't have any text for that?
Steve: We've definitely talked about it, but it might not be in the
draft now; but it is supported,
Multiple parties could make statements about the same subject (e.g. a
software security company could make a statement about some other
entity's software) and the provider could then make a counter statement
saying something like "that issue is fixed"
AJ: Not that there is a problem in the model, per se, but that the text
says it is singular.
Steve: will check the text
Henk: It isn't explicit in the text, but it is there since the first
use case is software

Introduction to Transparency 201 (20 mins)

Erum Welling: Does the provenance contain the historical ownership?
Jon: Partially, it does capture some of it, but it depends on some
external searching ability; you have to be build to capture the subject
name and then find it
Erum: If the artifact gets modified, what happens?
Jon: SCITT only provides this signing and transparency; it is avowedly
agnostic to the content of the artifact; so it is possible to link
things together with their subjects and statements, but its not inherint
in SCITT.

SCRAPI and SCITT Transparency Services!

mcr: feeling on the fence about the unprotected header; selective
disclosure from teh SPICE mechanisms uses them potentially; it might
want behave differently. Might want a layer of indirection based on the
unprotected part. And the impacts of the subject from things that might
be the same, but have different unprotected material.
steve: we struggled with this, COSE says don't include the unprotected
header, and the receipt example is good with the expense report
mcr: e.g. capturing the exchange rate which is time dependent

aj: can you clarify what should and should not be stored in the
transparency log, you mentioned something about that quickly
steve: the ledger is only protecting of the signed statement, but an
implementation could include additional stores with the additional
information. So the unprotected header could be in the log, but it
doesn't have to be in the log
aj: so the draft does't use MUST on what you have to include and
exclude from the log
steve: there is a MUST that says you have to exclude the unprotected
header; want to make sure what is written to the log so that it can be
verified consistently
aj: okay - get what you're saying now

erum: is there a way for a chain to bypass this (so skipping a change in
the artifact)
jon: SCITT as defined is about making statements about artifacts; but
you can make policy around the use of the statements

roy: unsigned headers cannot prove a timeline of changes, etc.

henk: the arch says that its okay to send a set of stuff with a whole
pile of junk in the unprotected header; registration policies are
interesting because they could control the rules about notarized uses
and unprotected materials

SCRAPI (15 mins)

Next Steps (5 mins)

Wrap-up and Conclusion (5 mins)