[stir] Re: Verifiable Voice Protocol (VVP)

Brett Nemeroff <Brett.Nemeroff@numeracle.com> Tue, 14 October 2025 18:02 UTC

Return-Path: <Brett.Nemeroff@numeracle.com>
X-Original-To: stir@mail2.ietf.org
Delivered-To: stir@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 4905B736B8AA for <stir@mail2.ietf.org>; Tue, 14 Oct 2025 11:02:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.095
X-Spam-Level:
X-Spam-Status: No, score=-2.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=numeracle.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nxJO-kkKgFPw for <stir@mail2.ietf.org>; Tue, 14 Oct 2025 11:01:58 -0700 (PDT)
Received: from PH0PR06CU001.outbound.protection.outlook.com (mail-westus3azon11021135.outbound.protection.outlook.com [40.107.208.135]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 08EA7736B88D for <stir@ietf.org>; Tue, 14 Oct 2025 11:01:57 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=g1oAzWbEqqzfV31R/Jg2+T6d3Sy7QSdrGGfW1o6qCXj4bah/S+qqaGue72UinoyjbC4iVtZXVvMsPDD4FbZow+oZ/iEIyZ2w3Orp4dmVA6gifJ/H9qeLNzWYOboSosFQJ0BHNMscuc1IgPm5OdKDSMoSqr6Kp+rOo2StWeBErrjdx0He1iE9e2dSJeFrZfGeFcOoxk40N2N6jQZZx+VUR+wjLHdlp/83O1PjusQuYqTPR/UPVcyxikZXTCXIBl6F+QWRNjYbDDBLVpqw1KXRWQRFbJ4ZVWZ2t9x61BimoItPE0JeAqRF53UX8NS7tPH/3xfZLZgE0r2bvMdmRVN78Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=JKN+i4BACFZOlqcwTGT3oZCJ4PM+fK0onlmCQJdsHl8=; b=tzWDswlRUcGGlV/6uWjcQbAxQLIlBeGafCbu76UC6M5+BN9VTh+vb5P70i746SXKggZ+Ve1p6hRhtrYgNr7hBAk27Kyg2mIKN67qlbHaguXpSrda0ZwkkmRkiWkgbNDQIp7Rxk3ZOXmHCiflL+tkUXLLYfKY55SWTlCPCk+s4HuYQwJBVLZcmvZNfZa2VE1XEpCeQLrRmVGHBByFvZCVVZpSyJNGzH+WUmFf5xxaD/i403z3/0PKQq54/p+tEfXqw75HxLsmWoq7g7Y/MS+WOEsDfz6TmmcMDARU39LCruB/D1+ghbrkzFByW8Q7Q8REOeZewW9twwPxfrVcMXIOZQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=numeracle.com; dmarc=pass action=none header.from=numeracle.com; dkim=pass header.d=numeracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=numeracle.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=JKN+i4BACFZOlqcwTGT3oZCJ4PM+fK0onlmCQJdsHl8=; b=YA7D9WE4Ax3HIdwYzPtjSMEQHwn4WWSopLLpaIPGeDLDYUDvxqruW9KqcVuft7sEQiPdJVtcedPxtKkfcsDjvoQUV4EGeYQStX3WW8zu/9o3PWseGuTze21mZuUvC6e6ytSq8Sk1FwItK6E/xDmuripGWk3yRHRcrT8yuZ/seaLsJGQk3naAbKYKWKU3LqJvrnmKzK7PI3iI7W8azC+Bfsws4iTFCjW1a7t5gxCcIG4klgDKKAvu2LpYnckDU3T+6fnFiPylqRfG9EJYUeCFDZLLVr01R8LL99Gc0YUrotkEL60UVipYMzsUFAJkTSyZazzVZVLil9wQXVdpjt/zJw==
Received: from DM6PR13MB4067.namprd13.prod.outlook.com (2603:10b6:5:2a6::8) by CH2PR13MB3782.namprd13.prod.outlook.com (2603:10b6:610:a0::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9228.10; Tue, 14 Oct 2025 18:01:48 +0000
Received: from DM6PR13MB4067.namprd13.prod.outlook.com ([fe80::6ad6:b321:4a57:6322]) by DM6PR13MB4067.namprd13.prod.outlook.com ([fe80::6ad6:b321:4a57:6322%5]) with mapi id 15.20.9203.009; Tue, 14 Oct 2025 18:01:48 +0000
From: Brett Nemeroff <Brett.Nemeroff@numeracle.com>
To: Daniel Hardman <daniel.hardman@gmail.com>, "Peterson, Jon" <Jon.Peterson=40transunion.com@dmarc.ietf.org>
Thread-Topic: [stir] Re: Verifiable Voice Protocol (VVP)
Thread-Index: AQHcOehaAdeXNqB86USq38xc3GRAOLTBlS+AgABOdoCAABE+Hg==
Date: Tue, 14 Oct 2025 18:01:48 +0000
Message-ID: <DM6PR13MB40675CCAB01438FF0D1F7BBC9AEBA@DM6PR13MB4067.namprd13.prod.outlook.com>
References: <CAD5OKxsCDRA_TWfqBNQjpoACntFfqOS98cVHL8aWNR8YKvjR+Q@mail.gmail.com> <0687B06D-E2A6-4461-8486-91D6DF64CF85@chriswendt.net> <CH3PR13MB67474A4BBA37A797BD655CD9E1E1A@CH3PR13MB6747.namprd13.prod.outlook.com> <CAD5OKxsDrC9r-skA_h+=hiNcFELONEKncvz-woiN2wwOs9JcvQ@mail.gmail.com> <CH3PR13MB6747A843414CC671AA4588BFE1E1A@CH3PR13MB6747.namprd13.prod.outlook.com> <D3BB43A7-4249-4BB9-8237-16118933E742@vigilsec.com> <CAMzqgoysSOsXTzn6xH2ok_bx7yjpbONQVSzyj25tfZ2E2oeUaQ@mail.gmail.com> <CO6PR17MB49786AE19F3623ED479CCBD6FDEBA@CO6PR17MB4978.namprd17.prod.outlook.com> <CACU_chkY84xFHYLeNcjgPFq7rFdTb+oWzYHD2iFEe7YGOAGQhw@mail.gmail.com>
In-Reply-To: <CACU_chkY84xFHYLeNcjgPFq7rFdTb+oWzYHD2iFEe7YGOAGQhw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_15e9b572-a956-451d-b5da-feb99663c3d1_Enabled=True;MSIP_Label_15e9b572-a956-451d-b5da-feb99663c3d1_SiteId=b807d15e-47b0-447f-a656-f397dba6285c;MSIP_Label_15e9b572-a956-451d-b5da-feb99663c3d1_SetDate=2025-10-14T17:59:56.9567799Z;MSIP_Label_15e9b572-a956-451d-b5da-feb99663c3d1_Name=Confidential;MSIP_Label_15e9b572-a956-451d-b5da-feb99663c3d1_ContentBits=3;MSIP_Label_15e9b572-a956-451d-b5da-feb99663c3d1_Method=Standard
x-ms-reactions: allow
x-codetwoprocessed: true
x-codetwo-clientsignature-inserted: true
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=numeracle.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DM6PR13MB4067:EE_|CH2PR13MB3782:EE_
x-ms-office365-filtering-correlation-id: 79848f0f-9353-40f0-87da-08de0b4bbef8
x-ms-exchange-atpmessageproperties: SA
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|4022899009|376014|366016|1800799024|4053099003|4013099003|13003099007|8096899003|7053199007|38070700021;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM6PR13MB4067.namprd13.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(4022899009)(376014)(366016)(1800799024)(4053099003)(4013099003)(13003099007)(8096899003)(7053199007)(38070700021);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/related; boundary="_004_DM6PR13MB40675CCAB01438FF0D1F7BBC9AEBADM6PR13MB4067namp_"; type="multipart/alternative"
MIME-Version: 1.0
X-OriginatorOrg: numeracle.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM6PR13MB4067.namprd13.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 79848f0f-9353-40f0-87da-08de0b4bbef8
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Oct 2025 18:01:48.7190 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: b807d15e-47b0-447f-a656-f397dba6285c
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: WX5vAC8pYA+Hntu0Yh2oQr5tjZZ/AtDXm+SHXY4g1zk0sDR02DKz0Zx2y/WKzhPWWT1Xip+Axv+X7jBD7m1F4L+bOKQRa5fHreLbcpY1N6w=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH2PR13MB3782
Message-ID-Hash: 3E6V6UPOTLRCLMUDJV7PLR5NMXRYS2NE
X-Message-ID-Hash: 3E6V6UPOTLRCLMUDJV7PLR5NMXRYS2NE
X-MailFrom: Brett.Nemeroff@numeracle.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-stir.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Orie <orie@or13.io>, Russ Housley <housley@vigilsec.com>, Pierce Gorman <Pierce.Gorman@numeracle.com>, Chris Wendt <chris-ietf@chriswendt.net>, Richard Shockey <richard@shockey.us>, IETF STIR Mail List <stir@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [stir] Re: Verifiable Voice Protocol (VVP)
List-Id: Secure Telephone Identity Revisited <stir.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/stir/eIx15FYhrhCMHRtQH7DvrPA2mTU>
List-Archive: <https://mailarchive.ietf.org/arch/browse/stir>
List-Help: <mailto:stir-request@ietf.org?subject=help>
List-Owner: <mailto:stir-owner@ietf.org>
List-Post: <mailto:stir@ietf.org>
List-Subscribe: <mailto:stir-join@ietf.org>
List-Unsubscribe: <mailto:stir-leave@ietf.org>

Daniel,
While I’m in other groups with you discussing this, I’m very interested from a STIR perspective what others think of this proposal.

I can’t speak for other STIR members, but I am interested in seeing that discussion and where it goes. I think it is of significant relevance to RCD, the FCC’s recent FNPRM and the OVC working groups as well.
-Brett



Brett Nemeroff
VP of Engineering - Voice
Brett.Nemeroff@numeracle.com<mailto:%7BE-mail%7D> | 1-512-203-3884

[Logo.png]<https://www.numeracle.com/>

Empowering Calls with
Identity Management<https://www.numeracle.com/insights/entity-identity-management-to-empower-your-calls>


CONFIDENTIAL

From: Daniel Hardman <daniel.hardman@gmail.com>
Date: Tuesday, October 14, 2025 at 11:58 AM
To: Peterson, Jon <Jon.Peterson=40transunion.com@dmarc.ietf.org>
Cc: Orie <orie@or13.io>, Russ Housley <housley@vigilsec.com>, Pierce Gorman <Pierce.Gorman@numeracle.com>, Chris Wendt <chris-ietf@chriswendt.net>, Brett Nemeroff <Brett.Nemeroff@numeracle.com>, Richard Shockey <richard@shockey.us>, IETF STIR Mail List <stir@ietf.org>
Subject: Re: [stir] Re: Verifiable Voice Protocol (VVP)

You don't often get email from daniel.hardman@gmail.com. Learn why this is important<https://aka.ms/LearnAboutSenderIdentification>
Hi there, Jon. Thank you so much for having a look, and for providing some smart feedback.

Thank you as well for the pointer on connected identity (RFC 4916-update). How to communicate callee identity back the other direction was the part of VVP I was least confident of, so I'll definitely go study that.

VVP doesn't attempt to replace OP signing with caller signing; it wants both, and it bifurcates the evidence into two parts. There's ephemeral evidence (the passport that travels with the SIP signals), but it is linked to evidence with a much broader scope and a longer lifespan. The caller assembles this long-lived evidence, and signs the subset of that evidence that embodies their intentions; the OP signs the ephemeral passport. The long-lived evidence includes a statement from the caller signaling their intention to let the OP sign their passports, which links the two together.

The long-lived evidence does cover a lot of the same territory as RCD, but it goes beyond the specific remit of RCD, because it can prove arbitrarily complex propositions, including:

- the identity of the caller as a legal entity (Coca Cola Holdings UK Ltd, not "Coca Cola"), using an LEI which is unambiguous in all jurisdictions -- important for legal and regulatory accountability of the caller instead of the OP
- the caller has the right to use the CLI (and how that right traces back through a carrier, possibly via wholesalers and suballocations, to a national regulatory authority)
- the caller has the right to use brand assets or any other attributes that would appear in a jcard (as in RCD)
- the caller is working with a particular call center or BPO that has the delegated right to represent them and use their brand when making outbound calls (and the constraints under which that authority may be exercised, such as limiting by geo, call purpose, time of day, etc.)
- the identity of the call center or BPO as a legal entity
- the caller has delegated signing authority to a particular OP (and the constraints under which that authority may be exercised, such as limiting by geo, call purpose, time of day, etc.)
- the caller is a human instead of an AI (or alternatively, the caller is an AI agent that has formally delegated authority from the calling org to represent it in outbound calls)
- the caller has a settlement contract with a particular settlement provider and is willing to pay a particular price for branded calling info to appear on the handset
- the person or org making a call has one or more certifications, memberships, or other background (e.g., a licensed CPA, lawyer, or doctor)

Essentially the same information can move the other way, as in cases where a consumer calls a call center and wants assurance about similar facts. Carrying all of this info in a passport is not heavy, because it travels by hyperlink, not by direct embedding. And it is eminently cacheable; only revocation status needs rechecking, and that can be optimized dramatically.

VVP is not attempting to replace RCD; it is trying to enrich the evidence that is available to decision-makers. This opens up possibilities like bridging from a jurisdiction that doesn't use RCD, into one that does. Same for BCID. Same for SHAKEN. Essentially, we want a payload to be lossless WRT verifiable information content, and WRT to time (same info can be verified minutes, days, or years later). VVP is also lossless WRT channel/context, because the same information can be attached to a TLV in an SMS, or to the profile of a participant in a Zoom meeting or RCS or vCon, or to a post on social media. No need to re-assemble the evidence over and over. Then, if a communication enters a context where less information is needed, a simpler passport can be derived on demand -- kind of like a graphic artist derives a JPG from a lossless image on demand. There's nothing wrong with JPGs -- they're great. They just optimize for a different problem than the lossless raw form.

You're totally right that the long-lived evidence is certificate-like. However, there are some reasons why we're not using certificates, which I'd like a chance to explain to the group. Not sure if it's better to explain it over email or in a meeting?

--Daniel

On Tue, Oct 14, 2025 at 6:17 AM Peterson, Jon <Jon.Peterson=40transunion.com@dmarc.ietf.org<mailto:40transunion.com@dmarc.ietf.org>> wrote:

I took an initial look at this. Broadly, I’d probably embed most of the information in the proposed new PASSporT headers/claims into either subelements of rcd (a lot of this overlaps with what RCD does) or into STIR certs themselves. RCD is supposed to provide externally verifiable data about the calling party, data that you trust because you trust the party signing it - architecturally, it should be a sufficient wrapper for the sort of dossier the draft is linking to STIR.

In most  STIR deployments today, the OP (as the draft calls it) is the entity signing the PASSporT. If we could snap our fingers and make it the TNU (as the draft calls it) that signs PASSporTs today, I imagine the bulk of the problems this draft is trying to address would already be solved without the addition of any new headers. STIR has always strongly favored making the security association here (caller-callee)  as end-to-end as possible.

Also, transmitting this sort of assurance back from the callee to the caller is the problem we call “connected identity,” there is a mature draft describing it (4916-update). I would not recommend using an SDP field to pass such information in the backwards direction.

Jon Peterson
TransUnion

From: Orie <orie@or13.io<mailto:orie@or13.io>>
Date: Friday, October 10, 2025 at 9:19 AM
To: Russ Housley <housley@vigilsec.com<mailto:housley@vigilsec.com>>
Cc: Pierce Gorman <Pierce.Gorman@numeracle.com<mailto:Pierce.Gorman@numeracle.com>>, Chris Wendt <chris-ietf@chriswendt.net<mailto:chris-ietf@chriswendt.net>>, Brett Nemeroff <Brett.Nemeroff@numeracle.com<mailto:Brett.Nemeroff@numeracle.com>>, Richard Shockey <richard@shockey.us<mailto:richard@shockey.us>>, IETF STIR Mail List <stir@ietf.org<mailto:stir@ietf.org>>
Subject: [stir] Re: Verifiable Voice Protocol (VVP)

This Message Originated from Outside of the Organization
Do not click links or open attachments unless you can confirm the sender and know the content is safe.
Report Suspicious<https://us-phishalarm-ewt.proofpoint.com/EWT/v1/GX53klZ1TQ0!Y2Oq2O7wX37ubKekr-dBgYAjreGWKEVVDeLxjlKzsFDxWCESADeCsixwdZGWnG05ljc6pG33AO2U8owwJZgxbQXbV9GaVEd_2XRVawHgoC6IXX370JXaPMwhHPbUM9MVKg$>

Hi Daniel ! & STIR,

First time seeing this draft : )

There have been some STIR presentations of applicability of the "Issuer, Holder / Presenter, Verifier" model for verifiable credentials to STIR WG, at previous IETFs.
For folks less familiar with Verifiable Credentials, they are sorta like https://datatracker.ietf.org/doc/html/rfc5755<https://urldefense.com/v3/__https://datatracker.ietf.org/doc/html/rfc5755__;!!GX53klZ1TQ0!1v_DDAI_jfLPL72FRmRJh69uINmJYOn_UrvcBB1jcjoeIJD9EyrHtg3omFjBzF5qZHoF-E5v8w5X6QogRIo$>
They are also worked on in OAUTH and SPICE, with primitives coming from JOSE / COSE (or other security mechanisms like https://www.w3.org/TR/vc-data-integrity/<https://urldefense.com/v3/__https://www.w3.org/TR/vc-data-integrity/__;!!GX53klZ1TQ0!1v_DDAI_jfLPL72FRmRJh69uINmJYOn_UrvcBB1jcjoeIJD9EyrHtg3omFjBzF5qZHoF-E5v8w5Xos8Xu3M$>, or https://trustoverip.github.io/tswg-acdc-specification/<https://urldefense.com/v3/__https://trustoverip.github.io/tswg-acdc-specification/__;!!GX53klZ1TQ0!1v_DDAI_jfLPL72FRmRJh69uINmJYOn_UrvcBB1jcjoeIJD9EyrHtg3omFjBzF5qZHoF-E5v8w5XKCbTM4c$> )

Here are some related drafts to consider:

- https://datatracker.ietf.org/doc/draft-ietf-oauth-sd-jwt-vc/<https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-ietf-oauth-sd-jwt-vc/__;!!GX53klZ1TQ0!1v_DDAI_jfLPL72FRmRJh69uINmJYOn_UrvcBB1jcjoeIJD9EyrHtg3omFjBzF5qZHoF-E5v8w5XvE9nRZY$>
- https://datatracker.ietf.org/doc/draft-wendt-stir-vesper/<https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-wendt-stir-vesper/__;!!GX53klZ1TQ0!1v_DDAI_jfLPL72FRmRJh69uINmJYOn_UrvcBB1jcjoeIJD9EyrHtg3omFjBzF5qZHoF-E5v8w5X3AEU4Ec$>

The security technology "ACDCs" have also been proposed in this draft:

- https://datatracker.ietf.org/doc/draft-smith-satp-vlei-binding/<https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-smith-satp-vlei-binding/__;!!GX53klZ1TQ0!1v_DDAI_jfLPL72FRmRJh69uINmJYOn_UrvcBB1jcjoeIJD9EyrHtg3omFjBzF5qZHoF-E5v8w5XhyF--Oo$>

I'll leave it to the STIR chairs to handle the agenda discussions, just thought I would share some background on this topic.

Regards,

OS, ART AD





On Wed, Oct 8, 2025 at 12:44 PM Russ Housley <housley@vigilsec.com<mailto:housley@vigilsec.com>> wrote:
Pierce:

For historical reasons, the tooling fills in “Network Working Group“ if the author does not specify a working group.  The final RFC is approved, will just indicate "IETF"

Russ


On Oct 8, 2025, at 12:14 PM, Pierce Gorman <Pierce.Gorman@numeracle.com<mailto:Pierce.Gorman@numeracle.com>> wrote:

Is anyone aware of an effort to bring VVP into the STIR working group?

The protocol specification posted in the IETF archive under the “Network Working Group“ (?) defines a new kind of STIR PASSporT using numerous non-STI verifiable credentials.

Verifiable Voice Protocol<https://urldefense.com/v3/__https://www.ietf.org/archive/id/draft-hardman-verifiable-voice-protocol-00.html__;!!GX53klZ1TQ0!1v_DDAI_jfLPL72FRmRJh69uINmJYOn_UrvcBB1jcjoeIJD9EyrHtg3omFjBzF5qZHoF-E5v8w5XDdDnQzc$>

Pierce

_______________________________________________
stir mailing list -- stir@ietf.org<mailto:stir@ietf.org>
To unsubscribe send an email to stir-leave@ietf.org<mailto:stir-leave@ietf.org>
_______________________________________________
stir mailing list -- stir@ietf.org<mailto:stir@ietf.org>
To unsubscribe send an email to stir-leave@ietf.org<mailto:stir-leave@ietf.org>