[Ilc] Internet-Level Consensus bar BoF tonight 7:30pm, Amuse

David Mazieres <dm-list-ietf-ilc@scs.stanford.edu> Thu, 30 March 2017 18:46 UTC

Return-Path: <dm-list-ietf-ilc@scs.stanford.edu>
X-Original-To: ilc@ietfa.amsl.com
Delivered-To: ilc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DAC3F129454; Thu, 30 Mar 2017 11:46:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YrJkw6vzh-OY; Thu, 30 Mar 2017 11:46:42 -0700 (PDT)
Received: from market.scs.stanford.edu (www.scs.stanford.edu [IPv6:2001:470:806d:1::9]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AA562127843; Thu, 30 Mar 2017 11:46:42 -0700 (PDT)
Received: from market.scs.stanford.edu (localhost [127.0.0.1]) by market.scs.stanford.edu (8.15.2/8.15.2) with ESMTP id v2UIkgo9075499; Thu, 30 Mar 2017 11:46:42 -0700 (PDT)
Received: (from dm@localhost) by market.scs.stanford.edu (8.15.2/8.15.2/Submit) id v2UIkgjs044018; Thu, 30 Mar 2017 11:46:42 -0700 (PDT)
From: David Mazieres <dm-list-ietf-ilc@scs.stanford.edu>
To: saag@ietf.org, ilc@ietf.org, trans@ietf.org
In-Reply-To: <87a88uksu0.fsf@ta.scs.stanford.edu>
References: <87a88uksu0.fsf@ta.scs.stanford.edu>
Reply-To: David Mazieres expires 2017-06-28 PDT <mazieres-vpg55rgd72t8hn3rwqcqa5r552@temporary-address.scs.stanford.edu>
Date: Thu, 30 Mar 2017 11:46:41 -0700
Message-ID: <8760iqr4a6.fsf@ta.scs.stanford.edu>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/ilc/i-c9c7Efdb6qE6LM9ow2-3KCUiw>
Subject: [Ilc] Internet-Level Consensus bar BoF tonight 7:30pm, Amuse
X-BeenThere: ilc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussion of mechanisms and applications for Internet-level consensus." <ilc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ilc>, <mailto:ilc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ilc/>
List-Post: <mailto:ilc@ietf.org>
List-Help: <mailto:ilc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ilc>, <mailto:ilc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Mar 2017 18:46:44 -0000

For those interested in further discussion of Internet-level Consensus
(ILC) following my talk at the SAAG open meeting, let's meet at 7:30pm
at Amuse, the bar inside Swissotel right near the lobby.

David

David Mazieres <dm-list-ietf-ilc@scs.stanford.edu> writes:

> I'll be giving the following 30-minute talk during the saag session at
> the upcoming IETF meeting in Chicago, likely followed by a "bar bof" on
> Internet-level consensus that evening.
>
>
> 		Internet-Level Consensus is Practical
>
> 			    David Mazières
>
> 		      Security Area Open Meeting
> 		 Thursday March 30, 2017 15:20-17:20
> 			    Zurich D room
> 				   
> Consensus is the problem of agreeing on a valid input value among
> members of a distributed system.  Internet-level consensus extends the
> concept to global agreement, despite the fact that the Internet has no
> meaningful notion of membership.  This talk will report on the Stellar
> consensus protocol (SCP), an existence proof that secure consensus
> does not require well-defined membership.  SCP's key idea is for
> individual participants to decide for themselves which other
> participants they cannot afford to diverge from.  SCP guarantees
> agreement so long as there is transitive overlap in these
> dependencies.  SCP is in production use by the Stellar payment
> network, but has broader potential applications ranging from secure
> package distribution to key management in end-to-end email encryption.