2024-08-31: Rolling Alice: Architecting Alice: A Shell for a Ghost

by pdxjohnny
GNU/Linux ◆ xterm-256color ◆ bash 20 views

https://mailarchive.ietf.org/arch/msg/scitt/BjCAySWyODuhDWwn4kMtCoY5eDA/

most-excelent

Most excellent! Please let us know if there’s any sample code we can play with.

The stuff I have is rough but it’s over here:

Thank you, John

On Thu, Jul 11, 2024 at 8:02 AM Michael Prorock mprorock@mesur.io wrote:

100% we have already run some tests on using SCITT notaries for tracking AI data inputs as well as agent decision making and model components.

I suspect that this will get more formalized and documented publicly as we roll some of those features more broadly out, but that approach is proving valuable for certain key use cases so far.

Mike Prorock founder - mesur.io

On Thu, Jul 11, 2024, 09:52 John Andersen johnandersenpdx@gmail.com wrote:

Thank you for sharing Orie!

Maybe AI agent workload identity would be useful to determine access as well. SCITT could be helpful in keeping an audit trail as AI workloads mutate. Statements around the state of the BOM of the workload could be used to give it access based in its current state.

Thank you, John

On Thu, Jul 11, 2024 at 08:46 Orie Steele orie@transmute.industries wrote:

Hello,

I wanted to share some work happening in the IETF that may be of interest to contributors to this list:

IAB Workshop on AI-CONTROL

Large Language Models and other machine learning techniques require voluminous input data, and one common source of such data is the Internet – usually, “crawling” Web sites for publicly available content, much in the same way that search engines crawl the Web. This similarity has led to an emerging practice of allowing the Robots Exclusion Protocol (RFC 9309) to control the behavior of AI-oriented crawlers. …

DIEM Birds of a Feather

Digital Emblems BoF will discuss the problem of protecting resources with digital emblems (discoverable signatures, credentials, … tbd). There has been significant discussion of the problem space and stakeholders. I would summarize the discussion as: There are 2 scenarios, protecting digital resources from attack in regions of conflict (cyber space), in accordance with international laws. Protecting physical and digital resources in accordance with laws (supply chain / cross border trade / customs clearance). The BoF will likely focus on stakeholders and interest in these use cases, and I would expect a significant discussion of physical and digital supply chain topics.

Regards,

OS

– SCITT mailing list – scitt@ietf.org To unsubscribe send an email to scitt-leave@ietf.org

– SCITT mailing list – scitt@ietf.org To unsubscribe send an email to scitt-leave@ietf.org