
59:52
Paul Grehan - Australia

59:53
Chatchai - Thailand

59:54
Ivan Herman, W3C, connecting from France

59:56
Marie Wallace - Ireland

59:58
Zhaoji Lin,China

59:59
Hamid From Afghanistan

01:00:03
Eng. Daniel Bundi Kotonya, from Nairobi, Kenya 🇰🇪

01:00:03
Daniel Bachenheimer - USA

01:00:04
Vanja Pajić, Croatia

01:00:04
Dr Inaam ul haq World Bank Tanzania but connection from Pakistan

01:00:08
I'm Geethan Samarawickrama connecting from Sri Lanka

01:00:09
Tony Holmes UK

01:00:10
Vasily Dolmatov - Russian Federation

01:00:10
Craig Gibson - Trend Micro - Canada

01:00:11
Hi everyone. I'm Thomas Fogwill from South Africa

01:00:13
Daidi Zhong from China

01:00:19
Mr Adama KANE from Senegal

01:00:19
Xiaomi An from China

01:00:20
etaf palestaine

01:00:23
Tong Wu - China Telecom

01:00:25
Hi everyone, my name is Joe Amlung, and I am a Business Analyst from USA, working on terminology and the Open Concept Lab.

01:00:27
Hello My name is Chinsammy Christmah from Guyana

01:00:29
Markus Maaß, Germany

01:00:37
Chatchai from Thailand

01:00:39
Mukhtar Mahamed - from Somalia

01:00:39
Christophe Blanchi - Switzerland

01:00:43
Erik Andersen, Denmark

01:00:43
Sanghwan Park of KISA in Korea

01:00:45
Jet Tsao from Taiwan

01:00:45
Hello everyone, this is Keundug Park from Korea.

01:00:48
Hello everyone. My name is Nargis Maqsudova. GFF Tajikistan.

01:00:52
Good morning from Argentina. I’m Lia Molinari, professor at National university of La Plata, Argentina. I’m Vicechairman of SG17 (cyebersecurity) and vicechaiman of WP3, Cybersecurity and management

01:00:52
Haydee Serona from the Philippines. Good evening from Manila!

01:00:56
Manuchehr A. TEC-19 WB, Tajikistan

01:00:58
Ziqin Sang, China Information Communication Technologies Group, China

01:00:58
Joseph Wu from Malawi🇲🇼

01:00:58
Hi all, Jonathan Payne from US

01:00:59
Tamara Sznaidleder fro Israel

01:01:18
Giovanni CAMBRONERO, IT and Cybersecurity Leader at ANCE MEXICO

01:01:19
Raphael Mahinya from Tanzania

01:01:27
Hello from Heng QIAN, China

01:01:29
Suhrob, Tajikistan, WB TEC-19 project

01:01:34
Good afternoon, Abdulakhad Safarov, NPO, WHO CO in Tajikistan

01:01:46
Eliot Choi working for Raonsecure from Korea

01:01:55
CEO of NaiTech, owners of ImmuniCard and CovIDent. Kenya 🇰🇪

01:02:01
Welcome to the ITU/WHO Workshop on "Digital Vaccination Certificate": https://www.itu.int/en/ITU-T/Workshops-and-Seminars/2021/0811/Pages/default.aspx

01:02:05
James McDonald - UK - from World Travel & Tourism Council [WTTC]

01:03:44
yes. I am not using a background. I’m lucky my little apartment has a good zoom look with the bookshelf.

01:03:59
Hello everyone … Tracy Hackshaw from Trinidad and Tobago. Connect with me on LinkedIn at https://linkedin.com/in/tracyhackshaw Twitter at https://twitter.com/thackshaw Instagram at https://instagram.com/tracyhackshaw

01:05:37
Link to the program line up:https://www.itu.int/en/ITU-T/Workshops-and-Seminars/2021/0811/Pages/Programme.aspx

01:07:29
Good day and warm compliments to all participants.My names are Adetunji Basorun from Nigeria.I am as pleased to be part of this event as well wish everyone participating a very fruitful set of deliberations.

01:08:46
Hello to everyone. I'm Herbert Bertine, former chairman of ITU SG17.

01:10:27
Hi. everyone, I'm Heung-Ryong OH from Korea.

01:12:00
👍

01:20:11
@ Abbie: Can you please indicate here the order of panellists for your session.. . thank you

01:22:29
hi good day my name is qais azad from Afghanistan

01:22:36
Panel #2 - Craig Gibson, Gautam Hazari, SangHwan Park, Ramesh Kesunapalli

01:23:14
True. If the certificate ms aren't standardized, it creates anarchy and loopholes for forgeries and abuse, which is not good.

01:23:58
@ Craig: thank you. well noted.

01:25:43
Hello to everyone, I am Hideki Yamamoto, vice-chairman of ITU-T SG16.

01:46:12
THANK YOU, GREAT WORK.

01:46:44
Link to the FHIR Implementation Guide: https://worldhealthorganization.github.io/ddcc/

01:46:48
Hi … will the slide deck be available afterwards?

01:48:37
the link is the GitHub repository… is it ok?

01:49:04
All presentation materials will be made available on the event webpage here: https://www.itu.int/en/ITU-T/Workshops-and-Seminars/2021/0811/Pages/Programme.aspx

01:49:53
Thanks @Gifty

01:56:12
great, thank you

02:01:43
Please use the Q&A icon at the bottom of your screens for all questions to the panellists, stating first the name of the panellist to whom the question is addressed. thank you.

02:06:52
wouldn't it be the case QR would be required even with verifiable credential as a presentation medium to trigger credential sharing?

02:07:26
That’s good points!

02:07:32
Not necessarily. Communicating data via a QR Code is only one way to exchange data

02:07:47
not all QR Codes are the same. When presenting your verifiable credential “as” a QR code it is copiable by anyone and can be replayed.

02:07:53
You can exchange data between mobile devices through multiple protocols

02:08:12
With verifiable presentations - only the individual who holds the credential can generate that - and it can’t be replayed.

02:09:48
Totally agreed

02:10:14
ok. it make sense that way, user generated and can't be replayed.👍

02:12:45
THX Daniel!

02:12:51
I shared the blueprint with the W3C Credentials Community Group last week - it will be live online on ToIP sites and other places in the coming days as Dan said - please don’t circulate via social media etc yet. https://lists.w3.org/Archives/Public/public-credentials/2021Aug/att-0023/GHP_Interoperability_Blueprint_V1.0.0.pdf

02:14:40
@Daniel, good presentation, but to be able to actively include Africa and most third world countries, this approach must be expanded or twitched alot to be effective and less isolating. I would give a case study of how this can be handled better meet specific infrastructural gaps in the regions.

02:15:25
but so far, great insights presented there. Thanks Daniel.

02:17:45
@Daniel Bundi - thank you; we agree that inclusivity is key and whatever solution must be adaptable to the reqion (tech and policy)… paper is one option, custodial wallets another, and there are others

02:18:21
True.

02:19:37
been working on a hybrid local solution that can be scaled and integrated. can be shared after the session.

02:19:45
At Linux Foundation Public Health, we are working with the community to produce tech specs and open source codebases that can support jurisdictions to adopt the GHP recommendations. @Daniel Bundi, would love to speak and see how we can support the efforts in Africa.

02:20:55
@ Craig: I guess you will be moderating session 2 as there is still no sign of Nicole..

02:27:20
Thanks a lot, Marie, for good presentation.

02:27:38
Thanks @keundug :)

02:31:03
+10 - thank you!

02:32:38
true

02:35:20
Excellent presentation Marie. Very clear description of the scope of the problems and challenges that need to be addressed to establish trust in any COVID certificate.

02:35:50
The Schema Task Force @ Covid Credentials Initiative (CCI) has an ongoing and open working draft for Overlays Capture Architecture (OCA) data capture specification for “Good Health Pass”-compliant credentials (vax/testing/recovery) and pass. Feel free to contact me directly for more information.

02:35:54
Thanks @christophe, it can seem a bit overwhelming at times.

02:36:23
I have difficulties understanding the speaker...

02:36:31
Cannot hear the speaker

02:36:55
Abbie, we can not hear you.

02:38:51
Hi @Kaliya can you post the links from your last slide (subscription email, links to docs etc) here in this chat?

02:43:05
Subscribe to the mailing list to: gccn+subscribe@lists.lfph.io

02:43:17
Kaliya Young: kaliyay.cci@lfph.io

02:43:23
Twitter handle @IdentityWoman

02:43:51
Defining the GCCN Trust Registry Network Discussion, Definition and Elaboration https://docs.google.com/document/d/1vz9cK_m5YKyoRY8DhBHLoyACP3Vfx2uFqFiVHxWOH3Q/edit#heading=h.hjaz4ngjqopx

02:44:02
Global COVID Certificate Network (GCCN)Trust Registry Network Implementers Meeting Pagehttps://docs.google.com/document/d/1_NbYlVFOLaHmCFgSd7XSCN9OjTLiCc4gJ0PCpTNhMLs/edit

02:44:19
CCI Schema Task Force Meeting Page - https://docs.google.com/document/d/1jAFXY_UGBg4X34hHGSWJNKFVT_6znf006S1kIdrX3PY/edit

02:44:24
Thanks @kaliya!

02:45:22
Information on how to join/get involved with CCI - https://www.covidcreds.org/#Join

02:46:20
The "get healthcare without providing identity" notion presents non-trivial patient safety and quality of care challenges.

02:46:49
;'

02:47:23
thank you ☺️

02:48:05
Thanks, Dan, Marie, and Kaliya! Great stuff.

02:48:20
You can also reach out to my colleague Lucy Yang who is the Community Director at CCI her e-mail is lucyy.cci@lfph.io

02:55:42
This is one of the more frightening developments in recent times… How pervasive is it today? and what a can be done to protect - avoid the situation?

02:55:55
I would recommend that for anyone interested in multi-credential verification, check out the CCI working group. It's a great place to start.

02:56:17
https://www.lfph.io/cci/

02:57:08
We have a newsletter that goes out every 2 weeks that you can subscribe to here and see past issues https://us10.campaign-archive.com/home/?u=1e21ad08ed0422a5dac0b8eed&id=ebe791efe9

03:12:24
I am not my phone number. It can’t really work this way - because I “rent” that number it isn’t mine. Decentralized Identifiers are designed to route around the issue of how the phone system has anchored people to identifiers they don’t own but they rent.

03:13:49
If the phone is rent, the SIM identity solution can not be applied for this case.

03:14:27
Agreed with Kaliya. Also, as (I think) Marie said, the credential may have to be used in, say, a Web page, on my laptop when I check in to my flight. I may not want to do that on my phone…

03:14:52
I support Ivan Herman

03:15:57
In many contexts, phones (and sims) are shared by multiple users and/or there is a lot of "churn" as sims are changed frequently. This will also require a strong binding somewhere between sim and person identity, which can be a weakness and raise privacy concerns.

03:16:26
@Kaliaya thanks for raising the interesting point. The phone number is not really my Identity - it is an alias/Identifier to my Identity - and I own my Identity. The alias (phone number) is portable and I can take it along when I move to any other provider.

03:16:45
small kids hasnt smart phones ...

03:17:02
but they tavel too

03:17:47
SIM/eSIM has its outstanding advantages.

03:17:49
The SIM can be seen as a secure element - with protection using business processes,

03:19:25
@gautam - if I stop paying my phone bill I loose access to the number and after a certain period someone else will get it. It is not a good identifier and it is also persistent across contexts - this creates the possibility of linkability.

03:20:21
The most advanced VCs are using Link secrets to connect credentials for an individual - https://www.evernym.com/blog/how-does-a-verifier-know-the-credential-is-yours/

03:20:23
Africa has over 1billion people, with over 50 countries with porous boarders.... and an extremely variant penetration of smartphones and ICT infrastructure.... this is the real elephant in the room!

03:20:58
@kaliya, to be fair, I am not sure the phone numbers are reused even if I stop using it

03:21:17
@ivan in my country that is the case.

03:21:38
Oops… I did not know. AFAIK, that is not the case here...

03:22:11
Anyway, another issue if one changes countries, ie, operators and, certainly, phone numbers

03:22:29
There are several different flavors of verifiable credentials. I wrote a paper about them that hopefully can be helpful in discerning this technology - https://www.lfph.io/2021/02/11/cci-verifiable-credentials-flavors-and-interoperability-paper/

03:22:31
@ivan, in kenya, phone numbers are reused and reallocate to different users if not used in like 3 months. that's partly why not even trucaller is accurate here. let alone using phone numbers as identifiers

03:23:09
@Daniel, I understand; I must admit I did not realize that would be the case.

03:23:27
It is a shame…

03:23:39
if we have the next session, I would be glad to give a case study of the African realities, which I think is largely overlooked.

03:24:04
I think by humanizing Gautam meant phone numbers are layman friendly and hence to use them for the interaction between the human and the wallet. From wallet to the external world DIDs can take over with all their privacy preserving and security benefits

03:24:12
The phone number may be reused by other person. But we still have solution to protect the previous users' VC and allow the new user to bind the phone number with his/her VC

03:24:13
we have foolproof solutions that I would wish could be comsidered across

03:25:23
@Kaliya, you are right - it is a user’s choice, I can decide not to be with a mobile service provider and can still take my phone number with me as an identifier to another provider. My Identity is separated out from the aliases/identifiers - the association can be plural and I can always associate or disassociate one or more of the aliases from the Identity as a user’s choice

03:27:37
another idea: SIM/eSIM is used as a carrier of VC which is no need to bind the VC with the phone number

03:30:07
That may be a good method: the secure element holding key material is important, but I see the phone number as a kind of “Username” in a way

03:30:18
@Geethan, thanks for that. Yes - that’s exactly what it is, phone number is a human friendly Identifier - which can be used an alias towards the VC/DID or to the real Identity and this association is user driven

03:31:28
@Craig Gibson yes

03:31:34
@Craig - I agree, the phone number is the alias/Identifier and not the Identity and yes it is public/not-a-secret - so is equivalent to userid

03:31:42
please use the Q&A icon at the bottom of your screens for all questions addressed to the panellists. Please state the name of the panellist to whom the question is intended

03:36:52
The model Ramesh is putting forward is highly centralized if you are keen on engaging with folks working on governance in decentralized systems I invite you to look more closely at the work of Trust over IP Foundation https://trustoverip.org/

03:40:01
how about the infringement of the human rights because of covid vaccine circumstance? covid vaccine is effective but we need to consider more about human rights. is there somebody to explain more?

03:43:22
Given we may have centralized and decentralized models (see exchange just above), are there recommendations on what to choose and in which environments ? thanks.

03:44:13
In that case, shall FHIR/HL7 standards catering for the standaized vaccination messages?

03:44:23
Craig is talking about a very serious problem. Overlays Capture Architecture (OCA) is a truly interoperable solution for semantic harmonization. https://humancolossus.foundation/blog/cjzegoi58xgpfzwxyrqlroy48dihwz

03:44:56
+1 to what Paul just shared.

04:00:03
@panellists: would be good if you could all switch on your camera at this stage

04:13:00
to complement what Ivan is sharing - I wrote a paper about the various flavors of verifiable credentials - https://www.lfph.io/2021/02/11/cci-verifiable-credentials-flavors-and-interoperability-paper/

04:28:55
is there presentation? can'ts see it sorry.

04:29:21
same here, can't see the slides

04:29:38
No, Ms Xu is not using slides..

04:30:15
ah. I see. thanks.

04:31:48
Yes

04:32:23
Good

04:32:40
we do not hear clearly

04:32:41
Your audio is unstable.

04:33:29
It is not a matter of being close to the mike, the sound is muffled...

04:33:58
it is like talking under water...

04:36:20
a bit floating to surface now. it's ok. kkk

04:41:55
for interoperability to make sense, a level of standardization of key factors of verification is a necessary

04:57:55
we can do it right or right now... tough to do both

04:58:38
we need to do it right with or without COVID

04:58:55
Giving raw QR codes creates real risk to people. It could accelerate identity theft for people. So this also needs to be considered.

05:00:13
agree - we need something for now (band-aid) and something more enduring

05:00:17
exactly!

05:00:37
Agree

05:01:51
True 👍

05:04:29
best scenario, all governmantal authorities take responsibility of the confidentiality and protection of individual certificate. and allow verification to be done accros authority borders - with easiest and affordable way, taking into consideration of the context.

05:05:46
But it is a pity not to leverage the full potential and benefit of the digital identity infrastructure those countries advanced in vaccination, who happen to be countries also advanced in digital transformation.

05:07:16
existing paper based certificate can be used, but easy to be forged, given the current situation of the inequity in access to vaccine.

05:07:46
The vaccination certificate is sort of medical record including sensitive personal data. It is very risky to present the vaccination certificate as QR code.

05:13:39
We need to standardize the service model using decentralized identity, to identify security threats, and to specify security requirements against the identified security threats. ITU-T SG17 will be leader group on that.

05:13:39
The Overlays Capture Architecture (OCA) is a truly interoperable solution for semantic harmonization. https://humancolossus.foundation/blog/cjzegoi58xgpfzwxyrqlroy48dihwz

05:14:11
we at CCI are working with projects and countries around the world

05:14:36
Agree to Mr. Park. ITU and other IT SDOs we already developed standards for security of ICT

05:15:59
To implement these standards, it will be a long and incremental process.

05:16:40
COVID DVC is a good opportunity to leverage the existing and future IT security technologies.

05:18:41
here is the JIC landing page: http://www.jointinitiativecouncil.org/

05:18:53
A roadmap for all the existing work from different SDO's is important for interoperability.

05:19:12
and i'm embarrassed to have omitted DICOM (the digital imaging SDO) in my comments

05:22:50
Yes the PHA should have that data about you. However should the PHA be “pinged” and notified every time you share your vaccine certificate with someone - as is the current design that the WHO has proposed?

05:22:53
Agree with centered registration for vocabulary for semantic interoperablity.

05:23:15
Thanks for the great answer and mapped the clear way forward from the panelists. it's helpful for our system development.

05:25:07
The gap that has just been highlighted is similar to how Roaming works - cross federated global SLA

05:25:14
There is a fundamental mis-understanding about how different systems we are talking about work. Some are decentralized - where the verification happens at the edge - others are designed to ping back to the source - this creates a massive privacy problem so the source knows all the places someone uses the credential.

05:26:17
THANK YOU ALL FOR VERY USEFUL PRESENTATIONS.

05:26:48
Excellent! thank you for a vey interesting activity!

05:30:30
I can not see the shared screen.

05:30:38
OK

05:33:16
Nice Summary!

05:34:55
@Kaliya - the WHO DDCC specification is not prescriptive regarding how a member state will implement their vaccine status certificates. The DDCC specification describes how a member state could generate and cryptographically sign a normative, coded, core DDCC:VS data set. What happens downstream of this is up to the member state, based on their context.

05:38:53
Figure 8 puts forward a flow where the PHA is pinged when a person presents their certificate. So it looks like you are endorsing that kind of flow that raises for me a privacy concern.

05:39:01
@Derek Ritz, I looked at the draff of WHO DDCC:VS, really impressive. Congratulations. Looking forward to its publication.

05:42:48
Suggestion to add to “Session 2 summary”ITU should develop the digital vaccination certificate standard and guideline taking the security, trust assurance level, interoperability issues including trust anchor operation into account.

05:43:28
@Xiaoya Yang -- thank you, I will share your kind words with the DDCC team. :-) @Kaliya -- processes that MAY happen are not to be conflated with processes that SHALL happen. As I said, the specification is not prescriptive downstream of the generation of the signed normative FHIR document.

05:45:22
@Derek - the fact it is even optionally put forward as a potential flow is giving states bad design ideas. People should not have all the places they share a vaccine certificate tracked by the issuing state authority.

05:48:36
Dear @ITU & @WHO, thank you for today. Very informative. I would welcome an opportunity discuss further with you how the DDCC:VS may be implemented within international travel. There are specific complexities with this use case, that I would be keen to share with you, so that we can all achieve a seamless, interoperable system across international borders. Many thanks. James McDonald (World Travel & Tourism Council) - james.mcdonald@wttc.org

05:49:48
Thanks much to the organizing team, Xiaoya, Gifty and all steering committee members, beyond to all participants. It was a rich workshop. Thanks.

05:50:47
thanks for the good event

05:57:09
thank you very much for an engaging workshop; need to drop now👏

05:57:22
Thank you everyone -it was a fantastic session. 👏

05:57:25
Thank you for the useful workshop.

05:57:27
thanks, all. stay safe and well, everyone.

05:57:33
Thank you!

05:57:36
Thank you!

05:58:22
Thank You !