Logo

ITU/WHO Workshop on Digital Vaccination Certificate - Shared screen with speaker view
Paul Grehan
59:52
Paul Grehan - Australia
Chatchai Chanvej
59:53
Chatchai - Thailand
Ivan Herman
59:54
Ivan Herman, W3C, connecting from France
Marie Wallace
59:56
Marie Wallace - Ireland
zhaoji Lin
59:58
Zhaoji Lin,China
Hamidullah Safi
59:59
Hamid From Afghanistan
Daniel Bundi
01:00:03
Eng. Daniel Bundi Kotonya, from Nairobi, Kenya 🇰🇪
Daniel Bachenheimer
01:00:03
Daniel Bachenheimer - USA
Vanja Pajić
01:00:04
Vanja Pajić, Croatia
Inaam ul Haq
01:00:04
Dr Inaam ul haq World Bank Tanzania but connection from Pakistan
Geethan Samarawickrama
01:00:08
I'm Geethan Samarawickrama connecting from Sri Lanka
Tony Holmes
01:00:09
Tony Holmes UK
Vasily Dolmatov
01:00:10
Vasily Dolmatov - Russian Federation
Craig Gibson
01:00:10
Craig Gibson - Trend Micro - Canada
Thomas Fogwill
01:00:11
Hi everyone. I'm Thomas Fogwill from South Africa
Daidi Zhong
01:00:13
Daidi Zhong from China
Adama Kane
01:00:19
Mr Adama KANE from Senegal
Xiaomi An
01:00:19
Xiaomi An from China
Etaaf Shurafa
01:00:20
etaf palestaine
Tong Wu
01:00:23
Tong Wu - China Telecom
Joseph Amlung
01:00:25
Hi everyone, my name is Joe Amlung, and I am a Business Analyst from USA, working on terminology and the Open Concept Lab.
Chinsammy Christmah
01:00:27
Hello My name is Chinsammy Christmah from Guyana
Markus Maaß
01:00:29
Markus Maaß, Germany
Chatchai Chanvej
01:00:37
Chatchai from Thailand
Mukhtar Mahamed
01:00:39
Mukhtar Mahamed - from Somalia
Christophe Blanchi
01:00:39
Christophe Blanchi - Switzerland
Erik Andersen
01:00:43
Erik Andersen, Denmark
SangHwan PARK
01:00:43
Sanghwan Park of KISA in Korea
Jet Tsao
01:00:45
Jet Tsao from Taiwan
Keundug Park
01:00:45
Hello everyone, this is Keundug Park from Korea.
Nargis Maqsudova
01:00:48
Hello everyone. My name is Nargis Maqsudova. GFF Tajikistan.
Lia Molinari
01:00:52
Good morning from Argentina. I’m Lia Molinari, professor at National university of La Plata, Argentina. I’m Vicechairman of SG17 (cyebersecurity) and vicechaiman of WP3, Cybersecurity and management
Haydee Serona
01:00:52
Haydee Serona from the Philippines. Good evening from Manila!
Manuchehr Asomiddin
01:00:56
Manuchehr A. TEC-19 WB, Tajikistan
Ziqin Sang
01:00:58
Ziqin Sang, China Information Communication Technologies Group, China
Joseph Wu
01:00:58
Joseph Wu from Malawi🇲🇼
Jonathan Payne
01:00:58
Hi all, Jonathan Payne from US
Tamara Sznaidleder
01:00:59
Tamara Sznaidleder fro Israel
Giovanni Cambronero
01:01:18
Giovanni CAMBRONERO, IT and Cybersecurity Leader at ANCE MEXICO
Raphael Mahinya
01:01:19
Raphael Mahinya from Tanzania
Kai Guo
01:01:27
Hello from Heng QIAN, China
Suhrob Tadzhidinov
01:01:29
Suhrob, Tajikistan, WB TEC-19 project
Abdulakhad Safarov
01:01:34
Good afternoon, Abdulakhad Safarov, NPO, WHO CO in Tajikistan
Eliot Choi
01:01:46
Eliot Choi working for Raonsecure from Korea
Daniel Bundi
01:01:55
CEO of NaiTech, owners of ImmuniCard and CovIDent. Kenya 🇰🇪
Gifty Amoah (ITU)
01:02:01
Welcome to the ITU/WHO Workshop on "Digital Vaccination Certificate": https://www.itu.int/en/ITU-T/Workshops-and-Seminars/2021/0811/Pages/default.aspx
James McDonald
01:02:05
James McDonald - UK - from World Travel & Tourism Council [WTTC]
Kaliya Young
01:03:44
yes. I am not using a background. I’m lucky my little apartment has a good zoom look with the bookshelf.
Tracy Hackshaw
01:03:59
Hello everyone … Tracy Hackshaw from Trinidad and Tobago. Connect with me on LinkedIn at https://linkedin.com/in/tracyhackshaw Twitter at https://twitter.com/thackshaw Instagram at https://instagram.com/tracyhackshaw
Gifty Amoah (ITU)
01:05:37
Link to the program line up:https://www.itu.int/en/ITU-T/Workshops-and-Seminars/2021/0811/Pages/Programme.aspx
ADETUNJI BASORUN
01:07:29
Good day and warm compliments to all participants.My names are Adetunji Basorun from Nigeria.I am as pleased to be part of this event as well wish everyone participating a very fruitful set of deliberations.
Herbert Bertine
01:08:46
Hello to everyone. I'm Herbert Bertine, former chairman of ITU SG17.
Heung-Ryong Oh
01:10:27
Hi. everyone, I'm Heung-Ryong OH from Korea.
Daniel Bundi
01:12:00
👍
Gifty Amoah (ITU)
01:20:11
@ Abbie: Can you please indicate here the order of panellists for your session.. . thank you
Qais Azad
01:22:29
hi good day my name is qais azad from Afghanistan
Craig Gibson
01:22:36
Panel #2 - Craig Gibson, Gautam Hazari, SangHwan Park, Ramesh Kesunapalli
Daniel Bundi
01:23:14
True. If the certificate ms aren't standardized, it creates anarchy and loopholes for forgeries and abuse, which is not good.
Gifty Amoah (ITU)
01:23:58
@ Craig: thank you. well noted.
Hideki Yamamoto
01:25:43
Hello to everyone, I am Hideki Yamamoto, vice-chairman of ITU-T SG16.
Xiaomi An
01:46:12
THANK YOU, GREAT WORK.
Natschja Ratanaprayul
01:46:44
Link to the FHIR Implementation Guide: https://worldhealthorganization.github.io/ddcc/
Tracy Hackshaw
01:46:48
Hi … will the slide deck be available afterwards?
Lia Molinari
01:48:37
the link is the GitHub repository… is it ok?
Gifty Amoah (ITU)
01:49:04
All presentation materials will be made available on the event webpage here: https://www.itu.int/en/ITU-T/Workshops-and-Seminars/2021/0811/Pages/Programme.aspx
Tracy Hackshaw
01:49:53
Thanks @Gifty
Daniel Bundi
01:56:12
great, thank you
Gifty Amoah (ITU)
02:01:43
Please use the Q&A icon at the bottom of your screens for all questions to the panellists, stating first the name of the panellist to whom the question is addressed. thank you.
Geethan Samarawickrama
02:06:52
wouldn't it be the case QR would be required even with verifiable credential as a presentation medium to trigger credential sharing?
Keundug Park
02:07:26
That’s good points!
Marie Wallace
02:07:32
Not necessarily. Communicating data via a QR Code is only one way to exchange data
Kaliya Young
02:07:47
not all QR Codes are the same. When presenting your verifiable credential “as” a QR code it is copiable by anyone and can be replayed.
Marie Wallace
02:07:53
You can exchange data between mobile devices through multiple protocols
Kaliya Young
02:08:12
With verifiable presentations - only the individual who holds the credential can generate that - and it can’t be replayed.
Keundug Park
02:09:48
Totally agreed
Geethan Samarawickrama
02:10:14
ok. it make sense that way, user generated and can't be replayed.👍
Keundug Park
02:12:45
THX Daniel!
Kaliya Young
02:12:51
I shared the blueprint with the W3C Credentials Community Group last week - it will be live online on ToIP sites and other places in the coming days as Dan said - please don’t circulate via social media etc yet. https://lists.w3.org/Archives/Public/public-credentials/2021Aug/att-0023/GHP_Interoperability_Blueprint_V1.0.0.pdf
Daniel Bundi
02:14:40
@Daniel, good presentation, but to be able to actively include Africa and most third world countries, this approach must be expanded or twitched alot to be effective and less isolating. I would give a case study of how this can be handled better meet specific infrastructural gaps in the regions.
Daniel Bundi
02:15:25
but so far, great insights presented there. Thanks Daniel.
Daniel Bachenheimer
02:17:45
@Daniel Bundi - thank you; we agree that inclusivity is key and whatever solution must be adaptable to the reqion (tech and policy)… paper is one option, custodial wallets another, and there are others
Daniel Bundi
02:18:21
True.
Daniel Bundi
02:19:37
been working on a hybrid local solution that can be scaled and integrated. can be shared after the session.
Lucy Yang
02:19:45
At Linux Foundation Public Health, we are working with the community to produce tech specs and open source codebases that can support jurisdictions to adopt the GHP recommendations. @Daniel Bundi, would love to speak and see how we can support the efforts in Africa.
Gifty Amoah (ITU)
02:20:55
@ Craig: I guess you will be moderating session 2 as there is still no sign of Nicole..
Keundug Park
02:27:20
Thanks a lot, Marie, for good presentation.
Marie Wallace
02:27:38
Thanks @keundug :)
Eric Welton
02:31:03
+10 - thank you!
Daniel Bundi
02:32:38
true
Christophe Blanchi
02:35:20
Excellent presentation Marie. Very clear description of the scope of the problems and challenges that need to be addressed to establish trust in any COVID certificate.
Paul Knowles
02:35:50
The Schema Task Force @ Covid Credentials Initiative (CCI) has an ongoing and open working draft for Overlays Capture Architecture (OCA) data capture specification for “Good Health Pass”-compliant credentials (vax/testing/recovery) and pass. Feel free to contact me directly for more information.
Marie Wallace
02:35:54
Thanks @christophe, it can seem a bit overwhelming at times.
Ivan Herman
02:36:23
I have difficulties understanding the speaker...
Christopher Justice
02:36:31
Cannot hear the speaker
Keundug Park
02:36:55
Abbie, we can not hear you.
Tracy Hackshaw
02:38:51
Hi @Kaliya can you post the links from your last slide (subscription email, links to docs etc) here in this chat?
Kaliya Young
02:43:05
Subscribe to the mailing list to: gccn+subscribe@lists.lfph.io
Kaliya Young
02:43:17
Kaliya Young: kaliyay.cci@lfph.io
Kaliya Young
02:43:23
Twitter handle @IdentityWoman
Kaliya Young
02:43:51
Defining the GCCN Trust Registry Network Discussion, Definition and Elaboration https://docs.google.com/document/d/1vz9cK_m5YKyoRY8DhBHLoyACP3Vfx2uFqFiVHxWOH3Q/edit#heading=h.hjaz4ngjqopx
Kaliya Young
02:44:02
Global COVID Certificate Network (GCCN)Trust Registry Network Implementers Meeting Pagehttps://docs.google.com/document/d/1_NbYlVFOLaHmCFgSd7XSCN9OjTLiCc4gJ0PCpTNhMLs/edit
Kaliya Young
02:44:19
CCI Schema Task Force Meeting Page - https://docs.google.com/document/d/1jAFXY_UGBg4X34hHGSWJNKFVT_6znf006S1kIdrX3PY/edit
Tracy Hackshaw
02:44:24
Thanks @kaliya!
Kaliya Young
02:45:22
Information on how to join/get involved with CCI - https://www.covidcreds.org/#Join
Derek Ritz
02:46:20
The "get healthcare without providing identity" notion presents non-trivial patient safety and quality of care challenges.
Jae Hoon Nah, KR
02:46:49
;'
Daniel Bachenheimer
02:47:23
thank you ☺️
Paul Knowles
02:48:05
Thanks, Dan, Marie, and Kaliya! Great stuff.
Kaliya Young
02:48:20
You can also reach out to my colleague Lucy Yang who is the Community Director at CCI her e-mail is lucyy.cci@lfph.io
Christopher Justice
02:55:42
This is one of the more frightening developments in recent times… How pervasive is it today? and what a can be done to protect - avoid the situation?
Marie Wallace
02:55:55
I would recommend that for anyone interested in multi-credential verification, check out the CCI working group. It's a great place to start.
Marie Wallace
02:56:17
https://www.lfph.io/cci/
Kaliya Young
02:57:08
We have a newsletter that goes out every 2 weeks that you can subscribe to here and see past issues https://us10.campaign-archive.com/home/?u=1e21ad08ed0422a5dac0b8eed&id=ebe791efe9
Kaliya Young
03:12:24
I am not my phone number. It can’t really work this way - because I “rent” that number it isn’t mine. Decentralized Identifiers are designed to route around the issue of how the phone system has anchored people to identifiers they don’t own but they rent.
Xueqin Jia
03:13:49
If the phone is rent, the SIM identity solution can not be applied for this case.
Ivan Herman
03:14:27
Agreed with Kaliya. Also, as (I think) Marie said, the credential may have to be used in, say, a Web page, on my laptop when I check in to my flight. I may not want to do that on my phone…
Xueqin Jia
03:14:52
I support Ivan Herman
Thomas Fogwill
03:15:57
In many contexts, phones (and sims) are shared by multiple users and/or there is a lot of "churn" as sims are changed frequently. This will also require a strong binding somewhere between sim and person identity, which can be a weakness and raise privacy concerns.
Gautam Hazari
03:16:26
@Kaliaya thanks for raising the interesting point. The phone number is not really my Identity - it is an alias/Identifier to my Identity - and I own my Identity. The alias (phone number) is portable and I can take it along when I move to any other provider.
Maria de la Luz Perea Costa
03:16:45
small kids hasnt smart phones ...
Maria de la Luz Perea Costa
03:17:02
but they tavel too
Xueqin Jia
03:17:47
SIM/eSIM has its outstanding advantages.
Gautam Hazari
03:17:49
The SIM can be seen as a secure element - with protection using business processes,
Kaliya Young
03:19:25
@gautam - if I stop paying my phone bill I loose access to the number and after a certain period someone else will get it. It is not a good identifier and it is also persistent across contexts - this creates the possibility of linkability.
Kaliya Young
03:20:21
The most advanced VCs are using Link secrets to connect credentials for an individual - https://www.evernym.com/blog/how-does-a-verifier-know-the-credential-is-yours/
Daniel Bundi
03:20:23
Africa has over 1billion people, with over 50 countries with porous boarders.... and an extremely variant penetration of smartphones and ICT infrastructure.... this is the real elephant in the room!
Ivan Herman
03:20:58
@kaliya, to be fair, I am not sure the phone numbers are reused even if I stop using it
Kaliya Young
03:21:17
@ivan in my country that is the case.
Ivan Herman
03:21:38
Oops… I did not know. AFAIK, that is not the case here...
Ivan Herman
03:22:11
Anyway, another issue if one changes countries, ie, operators and, certainly, phone numbers
Kaliya Young
03:22:29
There are several different flavors of verifiable credentials. I wrote a paper about them that hopefully can be helpful in discerning this technology - https://www.lfph.io/2021/02/11/cci-verifiable-credentials-flavors-and-interoperability-paper/
Daniel Bundi
03:22:31
@ivan, in kenya, phone numbers are reused and reallocate to different users if not used in like 3 months. that's partly why not even trucaller is accurate here. let alone using phone numbers as identifiers
Ivan Herman
03:23:09
@Daniel, I understand; I must admit I did not realize that would be the case.
Ivan Herman
03:23:27
It is a shame…
Daniel Bundi
03:23:39
if we have the next session, I would be glad to give a case study of the African realities, which I think is largely overlooked.
Geethan Samarawickrama
03:24:04
I think by humanizing Gautam meant phone numbers are layman friendly and hence to use them for the interaction between the human and the wallet. From wallet to the external world DIDs can take over with all their privacy preserving and security benefits
Xueqin Jia
03:24:12
The phone number may be reused by other person. But we still have solution to protect the previous users' VC and allow the new user to bind the phone number with his/her VC
Daniel Bundi
03:24:13
we have foolproof solutions that I would wish could be comsidered across
Gautam Hazari
03:25:23
@Kaliya, you are right - it is a user’s choice, I can decide not to be with a mobile service provider and can still take my phone number with me as an identifier to another provider. My Identity is separated out from the aliases/identifiers - the association can be plural and I can always associate or disassociate one or more of the aliases from the Identity as a user’s choice
Xueqin Jia
03:27:37
another idea: SIM/eSIM is used as a carrier of VC which is no need to bind the VC with the phone number
Craig Gibson
03:30:07
That may be a good method: the secure element holding key material is important, but I see the phone number as a kind of “Username” in a way
Gautam Hazari
03:30:18
@Geethan, thanks for that. Yes - that’s exactly what it is, phone number is a human friendly Identifier - which can be used an alias towards the VC/DID or to the real Identity and this association is user driven
Xueqin Jia
03:31:28
@Craig Gibson yes
Gautam Hazari
03:31:34
@Craig - I agree, the phone number is the alias/Identifier and not the Identity and yes it is public/not-a-secret - so is equivalent to userid
Gifty Amoah (ITU)
03:31:42
please use the Q&A icon at the bottom of your screens for all questions addressed to the panellists. Please state the name of the panellist to whom the question is intended
Kaliya Young
03:36:52
The model Ramesh is putting forward is highly centralized if you are keen on engaging with folks working on governance in decentralized systems I invite you to look more closely at the work of Trust over IP Foundation https://trustoverip.org/
Bong Geun Sung
03:40:01
how about the infringement of the human rights because of covid vaccine circumstance? covid vaccine is effective but we need to consider more about human rights. is there somebody to explain more?
Marco Carugi
03:43:22
Given we may have centralized and decentralized models (see exchange just above), are there recommendations on what to choose and in which environments ? thanks.
Joseph Wu
03:44:13
In that case, shall FHIR/HL7 standards catering for the standaized vaccination messages?
Paul Knowles
03:44:23
Craig is talking about a very serious problem. Overlays Capture Architecture (OCA) is a truly interoperable solution for semantic harmonization. https://humancolossus.foundation/blog/cjzegoi58xgpfzwxyrqlroy48dihwz
Kaliya Young
03:44:56
+1 to what Paul just shared.
Gifty Amoah (ITU)
04:00:03
@panellists: would be good if you could all switch on your camera at this stage
Kaliya Young
04:13:00
to complement what Ivan is sharing - I wrote a paper about the various flavors of verifiable credentials - https://www.lfph.io/2021/02/11/cci-verifiable-credentials-flavors-and-interoperability-paper/
Joseph Wu
04:28:55
is there presentation? can'ts see it sorry.
Geethan Samarawickrama
04:29:21
same here, can't see the slides
Gifty Amoah (ITU)
04:29:38
No, Ms Xu is not using slides..
Joseph Wu
04:30:15
ah. I see. thanks.
Keundug Park
04:31:48
Yes
Keundug Park
04:32:23
Good
Marco Carugi
04:32:40
we do not hear clearly
Keundug Park
04:32:41
Your audio is unstable.
Ivan Herman
04:33:29
It is not a matter of being close to the mike, the sound is muffled...
Ivan Herman
04:33:58
it is like talking under water...
Joseph Wu
04:36:20
a bit floating to surface now. it's ok. kkk
Daniel Bundi
04:41:55
for interoperability to make sense, a level of standardization of key factors of verification is a necessary
Daniel Bachenheimer
04:57:55
we can do it right or right now... tough to do both
Daniel Bachenheimer
04:58:38
we need to do it right with or without COVID
Kaliya Young
04:58:55
Giving raw QR codes creates real risk to people. It could accelerate identity theft for people. So this also needs to be considered.
Daniel Bachenheimer
05:00:13
agree - we need something for now (band-aid) and something more enduring
Joseph Wu
05:00:17
exactly!
Xiaomi An
05:00:37
Agree
Daniel Bundi
05:01:51
True 👍
Joseph Wu
05:04:29
best scenario, all governmantal authorities take responsibility of the confidentiality and protection of individual certificate. and allow verification to be done accros authority borders - with easiest and affordable way, taking into consideration of the context.
Xiaoya Yang
05:05:46
But it is a pity not to leverage the full potential and benefit of the digital identity infrastructure those countries advanced in vaccination, who happen to be countries also advanced in digital transformation.
Xiaoya Yang
05:07:16
existing paper based certificate can be used, but easy to be forged, given the current situation of the inequity in access to vaccine.
Keundug Park
05:07:46
The vaccination certificate is sort of medical record including sensitive personal data. It is very risky to present the vaccination certificate as QR code.
Keundug Park
05:13:39
We need to standardize the service model using decentralized identity, to identify security threats, and to specify security requirements against the identified security threats. ITU-T SG17 will be leader group on that.
Kaliya Young
05:13:39
The Overlays Capture Architecture (OCA) is a truly interoperable solution for semantic harmonization. https://humancolossus.foundation/blog/cjzegoi58xgpfzwxyrqlroy48dihwz
Kaliya Young
05:14:11
we at CCI are working with projects and countries around the world
Xiaoya Yang
05:14:36
Agree to Mr. Park. ITU and other IT SDOs we already developed standards for security of ICT
Xiaoya Yang
05:15:59
To implement these standards, it will be a long and incremental process.
Xiaoya Yang
05:16:40
COVID DVC is a good opportunity to leverage the existing and future IT security technologies.
Derek Ritz
05:18:41
here is the JIC landing page: http://www.jointinitiativecouncil.org/
Xiaomi An
05:18:53
A roadmap for all the existing work from different SDO's is important for interoperability.
Derek Ritz
05:19:12
and i'm embarrassed to have omitted DICOM (the digital imaging SDO) in my comments
Kaliya Young
05:22:50
Yes the PHA should have that data about you. However should the PHA be “pinged” and notified every time you share your vaccine certificate with someone - as is the current design that the WHO has proposed?
Xiaomi An
05:22:53
Agree with centered registration for vocabulary for semantic interoperablity.
Joseph Wu
05:23:15
Thanks for the great answer and mapped the clear way forward from the panelists. it's helpful for our system development.
Craig Gibson
05:25:07
The gap that has just been highlighted is similar to how Roaming works - cross federated global SLA
Kaliya Young
05:25:14
There is a fundamental mis-understanding about how different systems we are talking about work. Some are decentralized - where the verification happens at the edge - others are designed to ping back to the source - this creates a massive privacy problem so the source knows all the places someone uses the credential.
Xiaomi An
05:26:17
THANK YOU ALL FOR VERY USEFUL PRESENTATIONS.
Lia Molinari
05:26:48
Excellent! thank you for a vey interesting activity!
Keundug Park
05:30:30
I can not see the shared screen.
Keundug Park
05:30:38
OK
Daniel Bachenheimer
05:33:16
Nice Summary!
Derek Ritz
05:34:55
@Kaliya - the WHO DDCC specification is not prescriptive regarding how a member state will implement their vaccine status certificates. The DDCC specification describes how a member state could generate and cryptographically sign a normative, coded, core DDCC:VS data set. What happens downstream of this is up to the member state, based on their context.
Kaliya Young
05:38:53
Figure 8 puts forward a flow where the PHA is pinged when a person presents their certificate. So it looks like you are endorsing that kind of flow that raises for me a privacy concern.
Xiaoya Yang
05:39:01
@Derek Ritz, I looked at the draff of WHO DDCC:VS, really impressive. Congratulations. Looking forward to its publication.
SangHwan Park
05:42:48
Suggestion to add to “Session 2 summary”ITU should develop the digital vaccination certificate standard and guideline taking the security, trust assurance level, interoperability issues including trust anchor operation into account.
Derek Ritz
05:43:28
@Xiaoya Yang -- thank you, I will share your kind words with the DDCC team. :-) @Kaliya -- processes that MAY happen are not to be conflated with processes that SHALL happen. As I said, the specification is not prescriptive downstream of the generation of the signed normative FHIR document.
Kaliya Young
05:45:22
@Derek - the fact it is even optionally put forward as a potential flow is giving states bad design ideas. People should not have all the places they share a vaccine certificate tracked by the issuing state authority.
James McDonald
05:48:36
Dear @ITU & @WHO, thank you for today. Very informative. I would welcome an opportunity discuss further with you how the DDCC:VS may be implemented within international travel. There are specific complexities with this use case, that I would be keen to share with you, so that we can all achieve a seamless, interoperable system across international borders. Many thanks. James McDonald (World Travel & Tourism Council) - james.mcdonald@wttc.org
Marco Carugi
05:49:48
Thanks much to the organizing team, Xiaoya, Gifty and all steering committee members, beyond to all participants. It was a rich workshop. Thanks.
Joseph Wu
05:50:47
thanks for the good event
Daniel Bachenheimer
05:57:09
thank you very much for an engaging workshop; need to drop now👏
Kaliya Young
05:57:22
Thank you everyone -it was a fantastic session. 👏
Kiho Yeo
05:57:25
Thank you for the useful workshop.
Derek Ritz
05:57:27
thanks, all. stay safe and well, everyone.
Craig Gibson
05:57:33
Thank you!
Keundug Park
05:57:36
Thank you!
Gautam Hazari
05:58:22
Thank You !