[SCITT] Re: IETF 126 Vienna (July 18-24) - SCITT WG Agenda Call

Lawrence Reilly <lawrencejohnreilly@gmail.com> Thu, 14 May 2026 13:39 UTC

Return-Path: <lawrencejohnreilly@gmail.com>
X-Original-To: scitt@mail2.ietf.org
Delivered-To: scitt@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 84F3FEE50781 for <scitt@mail2.ietf.org>; Thu, 14 May 2026 06:39:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1; t=1778765972; bh=H8tCEth80z/KZoJP1b8g7XgrRcChCbl8LASaDFw+1vQ=; h=References:In-Reply-To:From:Date:Subject:To:Cc; b=QcbhAw7wJru/3arXN64QWb6iTdwamG3J8ebCaQ4PwBQgrLiiZ6cMVL5Ff1bjjVB1m tF4PswgJxqxCc/y5pETmZqX7G8qT0jLDgx7rfcZgLoc9LQ8+9e1zLOzV4HhZMLDQeq bKZZSwP+o7/6RPsSGojYJkJQYwN++W9X9cL8c3Dc=
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qH-Wl25mAN5U for <scitt@mail2.ietf.org>; Thu, 14 May 2026 06:39:30 -0700 (PDT)
Received: from mail-ej1-x636.google.com (mail-ej1-x636.google.com [IPv6:2a00:1450:4864:20::636]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 4C439EE50746 for <scitt@ietf.org>; Thu, 14 May 2026 06:39:30 -0700 (PDT)
Received: by mail-ej1-x636.google.com with SMTP id a640c23a62f3a-bce386d5b85so863464266b.1 for <scitt@ietf.org>; Thu, 14 May 2026 06:39:30 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; t=1778765969; cv=none; d=google.com; s=arc-20240605; b=VSr5QbRmHqPiI7ihFYWTu1BV6j1xpvlYIbQ5xD+nlGpeLSQAlYbuKjry0UQuOU1cD7 R8x50Z8Z1p/P5L55Ubbaytm+lkBf9vEooHt03yt8sv9h3WEJBM0u/b5W1KkhoTKWj5Jm xgNf9h5TFP0h/56Uzyp7yg3XmQC465lUHazTnLvHp6IpGAAtdBO0bx8K3KvBSTFK8D2q Tb6RQ+/NTuVt0ThPHFMxfhIIx+w/uH5+HaR/+VxS8lpmq3KXjOXnoOpk96g0RI1shh9r uwKCYfIbbtR7V3UIZnpHEHecH2+Bg2mFT8l+lcQjMDo3ofSJQPAQn6JEwNvzEkKH9kNl ZsZA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:dkim-signature; bh=5ShpDn2WTjWrVKO+4IE1fzxmdEPKO+sjxkCG/1C9t2w=; fh=DhfxLtiAaNspGMV7jLhj63NH3pJg1r8DlvP3fsmHgwU=; b=JxDx4hnpUefMHJgCdVoVtgam0LYCOlDLUPa7yOi0c49fLhxr47ew+rSOcJnpmeG/Zl jmxRn2RtuSq7y+g+R7biCO1Uxaj4y8WWhCxlTZykRKWtqRX0mbdh5jsw0obBQ5xjt0Cc hEZLJAqvmRDSzc91Mt1tJgkOYR2EVrN/MQiEwX+Pi/D0eboybIhwHO1Q5NZJAahC9PZW yWWT2Tmge1G17xyeskGBJ99K4daJCkFNlemTbdA2n+rb8NRnr+mbjQjDMr/kBW28FnwA 6dkTxatzjObibV9mqXEnWrjXHV7BbUxP8al8bmO/dVbGgQa4iZunr5awJn7Vvuy9UGZR Ltfw==; darn=ietf.org
ARC-Authentication-Results: i=1; mx.google.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1778765969; x=1779370769; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=5ShpDn2WTjWrVKO+4IE1fzxmdEPKO+sjxkCG/1C9t2w=; b=r0hy9ohsn8WT1vEs6WhAQd/YcxgtpTRa+s+6yB2qMb820i4v6eGOkW/zWHnvzFm3MQ 95zw7ID6W6XaBZ+9npK5reCgIpysmBmpxUk5UXYQ82AxFBsYjTXxL33dKeWLVg0un8dF utBgg8q0tEAqw4UZMng+uaxXZDv5tEb2er7tZLjnh8DLnYtkg3Kf5uarsLzWMIIT1Xqg H9nWrD2/DHEY3mNcF0d43F/kJSc2Y84LT4hhZXvsFrEGm67BZBLc9rxbq7zTAKJamfIf 2TLFovUGvLVzjEAWwMFIZyR7Eqp7S5s3T9vg/6e/rrb6ngFgzXW2fmxap0mZiij26ppg wiUQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1778765969; x=1779370769; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=5ShpDn2WTjWrVKO+4IE1fzxmdEPKO+sjxkCG/1C9t2w=; b=KzRcsH1UFSHsRBhGzIYxhXBe5oo+4pv/oE0kZcisQ2AZ+tyaBQaSEn5MLLfjZ4NFtV 0eXuuI4PkIItoB4KLdYPb03Lxw+xEeOfpl/L6/HvIOO/Q0+3FI6qBUpJJLldU5tv1A5f i6RMmXpemmSxEh0fxPb0UCE3lxsC19nmuWNxA2rQHRUKEJu1tFZEwmmXGAGx2yJVLcqS SBIy1O7yFE+js+DLlCk1xQZHiQyPrPZg6+J1e8Fbc4bGWjmJj6QXT++gj3U8cXpd6KtN 5o3PVto36IXqvzQqc6/CTLR8GpH2UbPhJccqvjJCHBejSAD6tkULzM1y7gnSjmwgHByZ RQmA==
X-Forwarded-Encrypted: i=1; AFNElJ9QzvNYYbQKAvFOOFb6xwQOb2RA3tHeWQjUH9qpQ4f+NvbKezuBaKItB2v992LbCZZbbFn1XQ==@ietf.org
X-Gm-Message-State: AOJu0Yzt/w8z4GY8s8Uz+qHyh24I7Y1ciyTHNJxD/7vAQjhgQPr8oFC1 hDiNevm71Bwbk3Qq8Ml3oJvUTmVWFU05FFxmQvKYTINqJkciPcIeD8xQycO8wlqqvhJD7DdkzoI nvIvBWyFTl/TEoHeq1WNq6t4vojmfpVVtf6OW
X-Gm-Gg: Acq92OGbQw/G8+WfksYXmIGvgdfPFXMjWoiG1ZFtzpMFI1vC/0gg2wtE55B4wqafMx7 YodnfwKITxLpyyOyNLlGw0TGJ8fXCvlzP7y16a3mm8R8yvcGHYC2Y/eppjVMtdzY0WSvkS8E/KN ZFYwl3OsEOFZRRf5lBIjFsd9Rdmp5Mi0y61GMvVoWEEa9pJaAO3UvaE6mRO01Ag6LIjDgnst53R G+l3EOHb/nVIooj1rkMbh391SiqBMEiuZAepOTHHdEQmMAL30V537tNxk5ad6vSZDNBtvh80PKe dhQXfoHiFb3J28x57httYXwTJkAIlnwONSyMSDPTb9UauZvMptc=
X-Received: by 2002:a17:907:a0b:b0:bd5:7c3:aca1 with SMTP id a640c23a62f3a-bd507c3acecmr102337466b.49.1778765968544; Thu, 14 May 2026 06:39:28 -0700 (PDT)
MIME-Version: 1.0
References: <SA1PR21MB6104A16D42CFC1D80B126856A2062@SA1PR21MB6104.namprd21.prod.outlook.com> <075201dce2f9$a8a0b230$f9e21690$@businesscyberguardian.com>
In-Reply-To: <075201dce2f9$a8a0b230$f9e21690$@businesscyberguardian.com>
From: Lawrence Reilly <lawrencejohnreilly@gmail.com>
Date: Thu, 14 May 2026 09:39:15 -0400
X-Gm-Features: AVHnY4IvX_TyTSwZf6qIOkPdjDojvo95Xq-5TmBkB635Raijmj1mMTnA-IDFIFA
Message-ID: <CAHAdb+hUd=tT0v_rBK32HJ8PK0D07euHvHOQBg+WhCvPsMUnVQ@mail.gmail.com>
To: dick@businesscyberguardian.com
Content-Type: multipart/related; boundary="000000000000b1f54c0651c7392a"
Message-ID-Hash: 3AUVAB3L6GBOWYJ4NGRRD5CYFYSMPXSJ
X-Message-ID-Hash: 3AUVAB3L6GBOWYJ4NGRRD5CYFYSMPXSJ
X-MailFrom: lawrencejohnreilly@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Nicole Bates <nicolebates=40microsoft.com@dmarc.ietf.org>, scitt <scitt@ietf.org>, scitt-chairs@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [SCITT] Re: IETF 126 Vienna (July 18-24) - SCITT WG Agenda Call
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/H3oJc7B8cC2G1MPx8lV1vB1eRSw>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Owner: <mailto:scitt-owner@ietf.org>
List-Post: <mailto:scitt@ietf.org>
List-Subscribe: <mailto:scitt-join@ietf.org>
List-Unsubscribe: <mailto:scitt-leave@ietf.org>

Subject: Vienna Agenda Item – Presentation Request: REM Protocol, WebProof
& Agentic AI Provenance

Nicole,

Thank you for the update and congratulations on the new roles.

I would like to formally request an agenda slot in Vienna to present work
from several of my active Internet-Drafts that I believe are directly
relevant to the working group's current focus on supply chain integrity,
transparency, and trust.

Proposed presentation topics:

1. The REM Protocol (draft-reilly-rem-protocol-00/-01) — Dual-Layer Digital
Permanence: a composable cryptographic permanence stack combining DOI
archival with blockchain timestamp anchoring. Live production demo
available.

2. WebProof (draft-reilly-webproof-00) — a composable web stack layer
providing cryptographic proof of resource existence, integrity, authorship,
and timestamp; directly applicable to SCITT transparency log use cases.

3. Protocol Layer Prompt Engineering Specification (draft-reilly-plpes-00)
— cryptographic prompt integrity, agentic chain of custody, and injection
resistance for AI inference pipelines operating within governed supply
chains.

All three drafts are DOI-archived via Zenodo and Bitcoin-timestamped via
OpenTimestamps. A live 14-agent autonomous production system is deployed
and available for demonstration.

I am flexible on time allocation and can tailor the presentation to fit
whatever slot is available. I am prepared to present a live demo, a
technical overview, or both depending on what is most useful to the group.

Please let me know how to proceed and what information you need from me to
finalize the agenda.

Thank you for the opportunity.

Lawrence John Reilly Jr.
Protocol Architect & AI Engineer | IETF Internet-Draft Author
lawrencejohnreilly@gmail.com
datatracker.ietf.org (search: Reilly)
linkedin.com/in/lawrence-reilly-5bb80412b


On Wed, May 13, 2026, 12:58 PM Dick Brooks <dick@businesscyberguardian.com>
wrote:

> Nicole, please let me know if you need anything from me.
>
>
>
> IMO, this announcement from Google is a clear indicator that the
> transition from “plain old PKI” into “Public Trust Infrastructure” (PTI) is
> gaining momentum, and this is the sweet spot for SCITT Trust Registry
> Transparency Services to “verify trust” in the digital age.
>
>
> https://www.linkedin.com/posts/davekleidermacher_today-we-are-raising-the-software-supply-share-7457158773305139202-esxG/?utm_source=share&utm_medium=member_desktop&rcm=ACoAAABMsYcB3I6zhtjaqBqVcePEOQqxsZNzj5E
>
>
>
>
>
>
>
> Thanks,
>
>
>
> Dick Brooks
>
>   [image: Richard (Dick) Brooks]
>
> *Active Member of the CISA Critical Manufacturing Sector, *
>
> *Sector Coordinating Council – A Public-Private Partnership*
>
> Lifetime IEEE Member
>
> *Never trust software, always verify and report!
> <https://reliableenergyanalytics.com/products>* ™
>
> Risk always exists, but trust must be earned and awarded.™
>
> https://businesscyberguardian.com/
>
> Email: dick@businesscyberguardian.com
>
> Tel: +1 978-696-1788
>
>
>
>
>
> *From:* Nicole Bates <nicolebates=40microsoft.com@dmarc.ietf.org>
> *Sent:* Wednesday, May 13, 2026 12:54 PM
> *To:* scitt <scitt@ietf.org>
> *Cc:* scitt-chairs@ietf.org
> *Subject:* [SCITT] IETF 126 Vienna (July 18-24) - SCITT WG Agenda Call
>
>
>
> Hi all,
>
>
>
> IETF 126 Vienna (July 18-24) is approaching and it's time to start shaping
> our agenda. A couple of updates since we last met in Montreal at IETF 124:
>
>
>
>  - Christopher Inacio is now a Security Area Director.
>
>  - I'm joining Jon as co-chair of the SCITT Working Group.
>
>
>
> We've requested a 90-minute slot for Vienna. Here are a few topics that
> have been discussed in the weekly WG calls:
>
>
>
>  1. Update on SCITT specs (Architecture, SCRAPI)
>
>  2. CCF Profile update -
>
>  3. MMR Profile - Call for Adoption -
>
>  4. Future of the Working Group discussion
>
>  5. ...your topics here!
>
>
>
> As always, this is your working group. If you have topics, presentations,
> demos, or discussion items you'd like on the agenda, please reply to this
> thread and we'll build out the session.
>
>
>
> Looking forward to seeing everyone in Vienna.
>
>
>
> Nicole and Jon
>
>
>
>
>
>
> --
> SCITT mailing list -- scitt@ietf.org
> To unsubscribe send an email to scitt-leave@ietf.org
>