http://logs.xmpp.org/council/2019-03-27?p=h#2019-03-27-237ca0091c8adb57
Dave is having a catastrophic day, so would be grateful for skipping the
meeting this week.
Jonas and Georg would like to at least get the vote started on the Compliance
Suites.
Georg volunteers to chair - Dave takes up his
Version 0.1.0 of XEP-0418 (DNS Queries over XMPP (DoX)) has been
released.
Abstract:
This specification defines an XMPP protocol extension for sending DNS
queries and getting DNS responses over XML streams. Each DNS query-
response pair is mapped into an IQ exchange.
Changelog:
Accepted by vote
Version 0.1.0 of XEP-0417 (E2E Authentication in XMPP: Certificate
Issuance and Revocation) has been released.
Abstract:
This specification defines a way for a certificate authority to serve
certificate signing requests via XMPP in order to issue X.509
certificates for the use in end-to-end and
Hi,
(Just for context: some of us (including the author of the XEP) are
currently at the XMPP Sprint in Berlin so there is a lot of discussion
happening about ATT here as well but we try to also mirror some of
that discussion to the mailing list.)
And again, just because it wasn’t clear to me
On Sat, 30 Mar 2019 at 10:16, Daniel Gultsch wrote:
> Hi,
>
> I apologize in advanced for reiterating something that might have been
> obvious to anyone else but wasn’t to me:
>
> This XEP does two things:
> 1) Provide something that is basically equivalent to cross signing.
> Meaning if you
Le 2019-03-29 18:24, Jonas Schäfer a écrit :
On Freitag, 22. März 2019 08:43:01 CET goffi wrote:
Hello,
about a year ago, Daniel's proposition to encrypt files with OMEMO has
been rejected (proposal:
https://xmpp.org/extensions/inbox/omemo-media-sharing.html, council
rejection:
Hi,
I apologize in advanced for reiterating something that might have been
obvious to anyone else but wasn’t to me:
This XEP does two things:
1) Provide something that is basically equivalent to cross signing.
Meaning if you trust one of my devices you can trust all of my devices
2) When on