 Great, and we're back for day three, the final day of the computational cocktail party hour, I guess. This is what's going on more or less, so cheers. So today what's going to happen is, well first of all, what happened after we went off the air, those of you on telegram would know, is that we broke into small groups and worked on several use cases. We were able to identify the actors and the actions. In some cases we've got as far as some swim lane diagrams on use cases that involve, thanks. There are various takes on supply chains and then also on micro grids or on energy. And so we'll be coming back today to maybe take forward some of those use cases or possibly generate some new ones or combine and separate them. And we're joined by our friends and colleagues at Thomson Reuters Labs. And Brian Ulesny is going to walk us through some interesting tools that we may choose not to use. So today's about rules and tools, you could say. And we'll get started with Brian and team walk us through those tools. And then we'll go around the table and online to telegram to see if anyone has a use case that they would like to work on. We'll give people an opportunity to break into teams. And I think if we have, and we'll have to figure out whether we have enough people on telegram to do an online team or to maybe set up a hangout for them and maybe a HackMD file or if we have some real ringers and people with expertise online that can augment a team in the room or vice versa. So we'll get there. But first things first, and I guess I can't say enough about this as instructor and also our teacher's assistants were honored today by our Defense Logistics Agency participants with this Meritcoin for excellence and couldn't be more grateful for this. So thank you. And we're very, very glad to have you here. All right. So, so Brian, do you have the magic technology? I do. OK, let's hit it. OK. So thanks. So I'm here with Amit Shabit from the labs. Yes. Oh, sorry. Can you send me a hangout link as well? We'll do. There. OK. We're just switching our mutes. OK. Be audible now. That's your video. All right, so I'm here with Amit Shabit also from the TR Lab Boston and Shreya and Jane are extern for January. And so we are one of seven global labs within TR. And our focus isn't particularly around blockchain type issues, but thankfully we have colleagues in our Swiss lab outside of Zurich in Bar, Switzerland, who do focus a lot on blockchain stuff. And so they've been helping us out this morning, getting some very simple smart contact tracks going on the TR test blockchain that we. So yesterday we set up wallets on the blockchain and practiced sending little bits of ether to one another. And now we've got a little smart contract going that Amit will show you later. And that basically does something really simple, which is it figures out which is the larger of two bids for some unspecified good and returns the larger bid. So right now what I wanted to just show you is so I'm not going to go through all the slides. I'll get into the tools more quickly. Thompson Reuters' primary mission is to provide information and data to professionals who need it. So we have a big business in the financial finance and risk space, as tax and accounting space. We used to have a big business in the IP and science, so Pat data and trademark data and so on. And we spun that off, Clarivate, so Clarivate is the former TR IP and science division. So here's for example, if so here's a firm called Beringer Ingeleheim, which is a big Swiss pharmaceutical company. And so just to give you a sense of the kinds of, you know, the amounts of information we have. We have, you know, 48,000 pieces of news and broker research and things that's so on in the financial realm, 16,000 some legal documents about the legal status and law cases and so on, 180 pieces of tax analysis and so on. So one of the things that we've been doing in TR lately is taking, so all of you know, we have this data and it's grown by acquisition and we have these silos of data and we serve and we've been creating this giant knowledge graph out of these things. So we want to connect the, identify the connections between entities in all of the data that we have. And so we sell the TR knowledge graph, which consists of tens of billions of edges connecting entities at a very fine grained and curated level and certain kinds of relationships between those entities. So subsidiary relationships, for example. So knowing the corporate hierarchy is very important. We maintain those relationships. You know, so-and-so is sued by some other company, that's a relationship that's maintained. You know, quotes and instruments and all of these kinds of different entities are related in this knowledge graph and there are tools then that allow you to extend the knowledge graph with additional data and then you can do graph analytics and so on. One of the interesting, well, I'll get to that actually. So here's an example of, you know, just a small piece of the knowledge graph relating, so there's a company named Topson Reuters and it makes a product called ICON and there's a patent that applies to that product and the quote for the company is related to this instrument on the Toronto exchange and so on. So yes, we got guys and wigs. When you have tabular data, it's, you know, important, especially if your whole business is selling data to make sure that data is accurate and so on. But basically, the inaccuracies in tabular data is a little more confined to the actual row of data whereas in a graph inaccuracies affect all of the analytics that you're doing over that graph. So if you're, if some analytic that you're doing on the graph depends on accurately, you know, counting links, the distance in the path between some entity and some other entity or how between, you know, the betweenness of something. So how many paths between things cross through a certain node. If that node or those links are incorrect, then that's going to throw off all of your graph analysis. So it's very important to have accurate, you know, nodes and edge representations. And so I like to think that these are governed by two laws around node identity. So one comes from Bishop Butler, an 18th century philosopher who says everything is what it is and not another thing. So if anything that an identifier should only denote one thing, it shouldn't be ambiguous. It shouldn't be able to denote two things that are not themselves identical. Principle is Leibniz's law, the discernibility of identicals that says if two things are identical, then they have all and only the same properties. Basically these two principles give you a very strong, have very strong consequences for how you build a knowledge graph. So here's a graphical depiction of Butler's maxim that you can't have a URI denoting two things that are not, in fact, identical. And if Z bears property Q to this URI and it's identical to URI 2, then these things, then Z must bear relationship Q to URI 2 and so on, if they're identical. All right, so this leads you then to a couple of candidates for what you might use as an identifier for organizations, for example, and so one is the Reuters instrument code, or RIC, which is basically, that's the combination of the ticker symbol for a company and then a dot and then the exchange. And that's, for a long time Reuters used that as the sort of standard identifier for organizations. The problem is that ticker symbols change over time. So for example, the symbol C used to denote Chrysler and now it denotes Citibank. So if you're, you know, data munging and data analytics on a database and you don't realize that the symbol C dot and Y or whatever for the New York Stock Exchange, that that change reference at a certain period in time, that's probably having an effect on your analytics. DBPDURLs have multiple URIs for the same entity. DUNS numbers are nice and quite familiar, but DUNS numbers are for one, not public, they're private. So it's, you can't always determine the DUNS number for an entity. Generally for a government, if something has a government contract, then they do are required to denote their DUNS number. But a DUNS number also is location-specific, so it's sort of at a more fine grained level than the legal entity that we're sort of interested in. Website URIs might be a good idea, but they're sort of, they can change over time and are sort of unambiguous. So it's difficult to express, for example, that FIAT SPA and FIAT investments and be merged using Website URIs because some of those don't really have their own distinct URI for their Website URL. And tax identifiers are not generally public. So we suggest then the using, yep. So the authoritative source of existence and name for a legal entity, like a corporation LLC, not silver piators, any type of companies that you're talking about, are in the United States, the Secretary of State's office, where you're incorporated and where you have a name, a unique name in that jurisdiction. And then the equivalent office in other countries, just like a common sense obvious question you should probably address before we get into that, and we, as it's on the other side would be, why not the unique common name, you know, like general electric, you know, ink, like dash and why dash US or something so that, you know, because there are sometimes the same name across different states. So why not, why not that we just address it? I think those can be, it's possible to have the same common name in the same jurisdiction, right? So that's, like, number one now for disambiguation and analytics. And I think you had me number one number two, like, you know, like, what, what? Computable, maybe change would be another one, right? You can have the same name, even in jurisdictions like Massachusetts, where you're not supposed to have the same name at the same time. You can have the same name after some, like, respectful period of mourning, I guess, for the old company. And then, and the other thing is just as a matter of, you know, you can do a lot better, like when you kind of know the first four digits designate this and the next four, if you're doing reg X or some kind of analytics or processing, you know, the name can contain a lot of information when it's a string as an identifier. And there's, there's something in extra quality we'll get to in our projects, but identity, you know, includes names, common names, identifiers, and also, like, you know, roles and context, like a duly constituted New York company, whatever. So, like, there's many facets of, of, you know, like identity and you're looking really at the identifier thing. Well, we're looking at the identifier as a way to unambiguously denote entities and in this system of identifiers where the denotation of a thing won't change over time. You're looking for, you're looking for that, like, globally unique, um, um, um, um, uh, globally unique static identifier. That, that's that identifier of the serial number identifier. Right. Okay, so, so everyone, does that make sense for everyone? Yeah, it does, but you're also looking at the relationship between the developers based on those identifiers. Right, right. So, um, so the thing that, if something becomes a subsidiary, we don't then assign it the, um, the, uh, the identifier associated with the parent. It still maintains its identity and it just asserts that it has this relationship then to its parents. Great. Thank you. I just want to make sure everyone's on board. Sure. Especially those of us who are technical and not necessarily so legal. So carry on. Okay, so, uh, here's an interface that, um, people might find useful. So, uh, so you can go to permid.org. You can search for companies. Um, so here's Thompson Reuters. So there's, there's several for which the name Thompson Reuters matches. Thompson Reuters Corp. Thompson Reuters US LLC. Thompson Reuters US Holdings Inc. Thompson Reuters Markets KK. These are all distinct legal entities. This is actually the parent error. Um, and so, uh, we provide this lookup. We've got this permid. This permid will only ever denote this legal entity. Uh, that entity might go out of business. It might merge with something, but it will only ever denote that. Um, you get various kinds of information. Is it, is the public company? Is it active? Yes. I wanted an IPO. When was it, when was it incorporated? Uh, we've got links to, uh, the Thompson Reuters Business Classification at various levels. So at the top level, it's an industrial. At the more specific level, it's a professional commercial service. It's domiciled in Canada and incorporated in Canada. It's got a link to a, to a web, uh, website. And it's got a, also it's, uh, got a link to an LEI. And then we've also got the officers and directors of the company. And so on. And forgot how great this was. Links to the, the, the instruments and the, the RIC. And so on. And so on. And so forth. So all of these things, uh, this data, you can down, bulk load, download this data just for free by registering at this site. Uh, and the data is refreshed. Um, sometimes multiple times per day. So there's a whole team of people whose job, full-time job is curating this data set. There's around three and a half million, uh, organizations. I'm not sure how many officers and directors, but there's got to be an order of magnitude more, officers and directors. And, uh, and so on. So you can, you can, uh, the bulk download is, is here. And then of course you can tie that to the, um, uh, to the LEI. Let me just show you that you can, um, you can look things up in various ways. So if I copy the LEI that we talked about yesterday, the legal entity identifier, I can go back to entity search, look this up by LEI, and I get one and only Thompson Rogers Corp. Same thing I was looking at. All of these things have a de-referensible, uh, URI. So you can, um, use this in, within your sort of, you know, semantic web type applications and de-reference it to get the information. Uh, and I'll show you what this looks like in terms of, um, so you can get this in, in turtle or jsonld. And so here's the turtle response, uh, that in the, so it references various ontologies that it's getting these, these relationships from. Okay. So this is the, uh, system of identifiers, uh, at, um, you know, at basic level we have, you know, for organizations around three and a half million companies, um, that we track the, uh, they're linked to LEIs. LEIs are, uh, you have to apply for an LEI yourself. You have to, uh, determine that you want an LEI. LEIs are required, as we said yesterday. If you're going to do a mythic compliant trade, so if we're going to trade derivatives, for example, those fall under the mythic two regulation, which requires that both parties have a LEI assigned to them. So that's some impetus for getting, getting an LEI. And that rule went into force on January 3rd of this year. So just two weeks ago. Um, but there's still only about, uh, I believe somewhere around 600,000, um, LEIs in the world. Whereas we have 300, three and a half million organizational perm IDs that link to the LEIs. So a slightly bigger, um, universe for perm ID than, than LEIs. Um, let me just show you then, uh, we also have a, so for free, uh, and this is just the, uh, the demo, um, thing here, but there's a tagging tool that we have called, um, Thompson Reuters Intelligent Tagging, where it used to be known as, um, Open Calay. Uh, let me just get the, oh, yeah, let's just go to, uh, the service of, um, block one ID that we were using yesterday. Okay. So I'm just going to copy this license agreement, which is, you know, essentially a contract, paste it into the tagging tool. I'll say tag it. Okay. So it finds various entities. Oh, so it finds, for example, Thompson Reuters US LLC. So remember that was a distinct legal entity from the, uh, Thompson Reuters Corporation. It's got its perm ID that, that I can then, um, find, uh, further information about. Um, it tells, and it says that, uh, this document is 80% about this legal entity. Uh, it's got various kinds of relationships. So an acquisition, there's an acquisition between, uh, the WCGV licensee LLC. And Thompson Reuters. Um, there is quotations and so on. And then interestingly, it's got, uh, uh, some, well, these are kind of strange, uh, industries and social tags. Um, okay. So it realizes that this is a software license, for example, and the royalty payments are involved, uh, that there's some kind of economic activity here. It also assigns it to some other topics, which some of which are not, uh, super relevant here, but, um, uh, in general, it, well, it also has a relevance ranking. So some of these are not, are considered low ac, or low confidence. But anyway, uh, so you can, um, yeah, you can pass text in bulk through this, uh, the free thing is the free version is of course, you know, limited, but the, uh, uh, there's a paid service where you can. Yep. Yeah. The question about the organizational detail, is that something that is input and by the company? Or is that compiled by TR? It's compiled by TR. So, so, well, you know, uh, sometimes we'll just, if, if the company, if a company, for example, registers in a location that requires the company to disclose this, and it's easy, you know, and the most convenient thing for us is to just import that data and, uh, you know, and put it into our format, then we'll do that. But in some jurisdictions, it's, we'll, you know, we take that burden on, um, for our customers. But I looked at two companies going into a lot of detail, man, whereas Lockheed Martin Aerospace didn't have much. Really? So, that's a little surprising. I did my search wrong, but just for that particular organization that I found, it was mostly NA and kind of all kinds. Oh, yeah. Maybe, uh, maybe you didn't get, maybe there's several Lockheed, or did you say Lockheed? Lockheed Martin, actually, yeah. Maybe there are more than one Lockheed, and you're looking at the, at the, at a different one. I just wanted to point out here that, uh, you know, that you, you can mark, this comes back as, as, as marked up HTML in this interface, but you can download this, you can get the output of the intelligent tagging as RDF, which then is graph-shaped. And for example, you can do, um, Sparkle queries over that RDF graph to do some interesting things. So last year we were doing a, a little, um, with Daza on, um, contract analytics. So we took a lot of, um, terms and services from online, uh, services like Dropbox and, uh, oh, some of the other ones. AWS, Salesforce, we took those, we took those things and then we wanted to identify, for example, you know, what is the, um, governing law, you know, jurisdiction for these contracts. And so you can write some, some Sparkle queries then that say, find me a Thompson Reuters country, something that's identified, but there would be identified in Calais as a country or a state, and then do some pattern matching for the text, you know, the governing law of is, you know, such and such. Or this contract is governed by the laws of whatever. And then you can, it was easy enough to pull out the, uh, the governing jurisdiction for these various contracts using this tool. And then we displayed a lot of math and it's something like simple kind of sort of research and there's very nice tactics. One of those is the kind of collaboration is by working to come to where it is last. Because when we take that fundamentally legal question, because let's say you're like a, you're a line of, you're a person who needs to figure out GDPR is coming, UI of contracts that would be covered by that. Services, like the CIO question that would be covered, that would be subject to that law. Well, I don't know, like that wasn't the question that we get. That's like, that we don't really, there's not like a spreadsheet with that already. It's a neat question. How do you know? So we had to look at the available data and think through that context, how would you present the data? Well, math would be one way. And then, you know, we do a little bit of sort of research and the whole thing is like two or three days or something. Yeah, two days. The fractions of people's time. And they showed it at the, the first legal analytics from American Bar Association. Big meeting. So there you can too hack the law and then we can do it again today in a whole new way. Cool. So just to, you know, give some time to other organizations as well. So here's a, this comes from a company called Mako Labs, I believe, provides a service called lei.info where they're taking that life, the global lei registry, they're taking that data and they're also, they've also created an RDF or semantic web type interface to that. So you can also search for Thompson Reuters corp and get this and then get, get an RDF based representation of the company or has a, an lei profiling service that allows you to, since you've got, there's no legal method, compliant trade that doesn't involve lei registered entities. So this allows you this, we have an lei profiling, filing service that says, here's all the people I'm going to trade with today. Can you guarantee that they all have current leis? I just wanted to show you that, you know, the perm ID system is, allows you to query various, you know, datasets and across datasets. So you can, for example, query wiki data. So this query is saying, give me the logo for the company that has this perm ID, which, which turns out to be fiat. And this query will then return you the, this, this file, which is the fiat logo. So there's, there's various ways then to use this to do sort of, you know, fine-grained querying across different datasets. I showed you open perm ID. This, and I showed you that, I showed you trit. That's the Kali output and confidence metrics. Okay, so there's that. Then before we turn to the smart contracts, I just wanted to talk a little bit about how you might use this in various ways. So if you're a compliance officer at a company, for example, you know, you, you've got to assess the risk of that people, people you're partnering with are going to comply with various regulations. So one of which is, for example, there's a UK modern slavery act and there's executive orders in the US that for DOD contractors, for example, that they, they have to, they can't have any forced labor within their supply chain or they're excluded from, from contracts. So we did a project with, so I'm going the wrong direction, that's why. We did a project with our partners in the UK risk division of TR where the challenge was, can we take all of the information that we know about companies, so news data, legal cases, risk data, financial data, geographic data, tax data about companies and can we figure out and assign a risk profile to that company as to whether they are likely to run afoul of both the UK modern slavery act and the California similar legislation in the California supply chain act, US executive orders on forced labor and so on. There's similar legislation that's pending in the Netherlands and Australia. And the other thing that we looked at was a bribery and corruption risk. So what's the ding, what's the likelihood that a company that you're going to onboard as a partner or supplier, yeah, runs afoul of the foreign practices act. So where you're, you're responsible for what your suppliers do, for example, if they're, if they're bribing people, then that can result in a substantial penalty to you. So we, you know, took a risk-based policy where we wanted to, you know, understand where the red flags were in supply chains and be able to do ongoing monitoring. Oops, again, I'm going the wrong way. Yeah, so most, most of the time this is done currently through like, you know, Google searches and researches and so on. We incorporate this as one of the data sets, this Thompson Reuters country risk ranking, which is incorporates into a single interface various risk metrics at the country level for compliance with, you know, the appearance in the trafficking in persons report from the State Department, for example, what's their level of, you know, ease of doing business, corruption, indices and so on. I was one of the data sets we incorporated, world check data, which is data about perpetrators or financial crime of various kinds on the one hand and politically exposed persons on the other hand. So politically exposed people, people who hold office or are related to people who hold office, are in a position to do favors for companies. And so therefore, if you have a relationship with a politically exposed person, you're at increased property and corruption risk. Brazil's got a slight problem there. We used the Thompson Reuters value chain data set, so this is an interesting extension of the knowledge graph that I showed you. What we did here was we mined filings of public companies and news and found evidence in text that company A is a supplier of company B, or that company B regularly buys things from company A. And if there were sufficient pieces of textual evidence for a customer-supplier relationship, then we add this to this value chain data set and assign a confidence measure to it. So we have over 250,000 pieces of the, you know, connections in the global supply chain that we've mined from these public sources this way. So this is, for example, related to Boeing. Is it available publicly? Is that just announced? Yeah, it's available publicly, but it's not free. Yeah. The permadee stuff I showed you was all free. The corporate hierarchies that use that are not free. Okay, so anyway, the bottom line here is that we were able then to score because we could aggregate, distinguish things by permadees. We were able to distinguish legal entities at this legal entity level and associate them with a unique identifier. We were able to aggregate this information around that identifier, find all the pieces of evidence that said a company was likely to be involved with forced labor in the supply chain or bribery and corruption, produce a risk score based on that, and we were able to score all three and a half million companies with permadees, for example. And then for companies that had already published their top level suppliers, we were able to do then a distribution of the risk in their supply chain. So here's Apple has 149 suppliers that it published as part of it, the sort of reputational blowback to its problems with the supply chain in China. And so we scored all of those companies and we were able to say, okay, so it's encouraging that bribery risk is red and slavery risk is blue, that the majority of their companies are low risk, but it's troubling that there are these companies that are high risk and then you would want them to build into your contracts things that would mitigate that risk, ongoing monitoring, put into your contracts. You've got to guarantee that you're doing X, Y, and Z to risk that I've determined for your company. Okay, can I ask, first of all, this is impressive, I hadn't seen this before, and it's right on some of the things we've been right in terms of supply chains up, if they're irrelevant, doing trafficking, and source of goods, so forth. I'm wondering, is there any way to further validate this estimation of the low, medium, high risk grouping, like since you did it, has this trapped in the future to revelations, for example, of bribery or enforcement actions or anything like that? Yeah, so that's an important thing. And the other problem here is that very few of these cases ever get either litigated or let alone convicted, right? So, yes, saying this company did end up in legal trouble and we predicted they were high risk, that's an important thing. But it's not guaranteed that all the bad guys are being prosecuted. In fact, we know to a large extent that the bad guys are not being, there's no legal consequences. Right, appropriate work, I was just thinking of like former person that was, you know, at the time it felt like unenviable responsibility to monitor, to negotiate and monitor a bunch of contracts with suppliers or big organizations. It makes me wonder too, when I was thinking of validating revelations, I wasn't even necessarily thinking, but even like this one, is this Apple? Yeah, so like maybe people inside Apple who would then go out and do the site inspection or do, you know, the various other forms of monitoring that they do, if this would possibly in some way, you know, could be validated just from what they from their internal business intelligence and other centers. The other thing I realized is, geez, if I was in a sexual organization, I would probably put a lot more like active intelligence on the high-risk ones. And then guess what? I'd get a lot more evidence on the high-risk ones, which would skew the validation. So I'm not really sure how you would validate these actually. Maybe that's a question for further research. Yeah, yeah, exactly. Yeah, so that's very impressive. I'll say that. Okay, thank you. So here, for example, we were, there had been some email exchanges about berry amendment and by American prosecutions and so on. So yeah, so very, very few legal actions around the berry amendment, right? But I forget. Just a word on what is the berry amendment? Oh, yes. Anybody? Do you want to? Maybe you could, let's take the pressure off of our obstacles and like, you're the instructor, instructor. Oh, what's the berry amendment? I mean, what's the berry amendment? It is B-E-R-R-Y, not E-A-R-R-Y. B-E-R-R-Y. It's not Chuck Berry. So let me look. It's not raspberry. Well, does anyone want to volunteer? Who doesn't do this for a living? The berry amendment? Berry amendment? I would certainly commit like malpractice. I can give you the other three points. Essentially, it's a restriction on, you have to be in certain situations, source fields that are right in the United States from domestic sources. So the berry amendment is one of the regulations. And along with the types of regulations that require that. And but for a number of exceptions, domestic sources, they need to be sourced from U.S. sources. So that's in short with the berry. So in short, is U.S. domestic origin for products and services or products? My understanding is just, I don't see many supplies. Certainly products and supply chain from the main America. Right. And just a little question out of ignorance. I don't know if we're going to swap, but like with Apple and other stuff, I know like a lot, there's sort of in the global economy gradations of like, you know, what is the final screw turned in America to completely manufacture in America? Are some of the part sourced from elsewhere? Like, is that a thing with the berry amendment? Absolutely. That's a really great point around because that's the question. There are exceptions. Like you can maybe source something from one country, but it's reprocessed in America and then it might need the standard. But what does that mean? And is it one screw? Is it, you know, how do you define that? And that's, that's where the lawyers, you know, work our magic against, you know, provide guidance on what. Thank you. Yeah. So just, you know, in anticipation of this topic. So I looked up, for example, so we have, so this on the right is a pro part of a profile from our World Check product. So this is the risk product of someone who ran afoul of the berry amendment recently. So it was a contractor in Alabama who supplied baseball caps to the army that he purported were, were US made that were in fact made in China. He's in jail now. So this is, so this is his profile in World Check, which is links him to a company called Lamar International. And here's the profile then for Lamar International in icon, just a partial thing here. We can see that they have a perm ID, for example. So, you know, on the one hand, there, there are very few cases that seemed that I was able to identify that were prosecuted. And you own Westlaw. Just saying, go on. Yeah. So, so if you wanted to do, you know, like a predictive analytics around risk, you wouldn't have very many cases within that were actually prosecuted that you could use as your training set. I was talking with, with one of our friends here from the Defense Logistics Agency, and they were saying that not everything gets to the level of public prosecution that people can get on sort of lists of, you know, disfavored suppliers, for example. So then that raised an interesting issue for us at TR, for example. So in World Check, there's a lot of concerns about, so we maintain these lists of people who have committed crimes. You know, if something doesn't meet a certain criteria, then we can include them in our list because if we do, then we get sued. If we, if we keep people on the list after they've, for example, been arrested but not convicted, and they can also sue us because people use things like World Check to determine whether someone should have a, be allowed to have a banking account, part of the anti-money laundering system. So there's a lot of interesting things to go there that, about having data that you could do predictive analytics on, but whether you're legally able to gather that data or use that data for those purposes. Yes. So currently we have, you know, again, a lot of people whose full-time job is maintaining this database. So we have three or 400 people worldwide in, primarily in South Africa and in South America who do this for living. We did spend a lot of time this summer trying to, you know, think about ways that all that human effort could be augmented with data mining tools and so on. Yeah, yeah. So we also do have partnerships with NGOs like, we work with a fantastic NGO called Liberty Asia that works on forced labor in, primarily in, you know, South Asia. And, you know, labor trafficking is a much more significant problem than sex trafficking. And most of the world's labor trafficking takes place in Asia. But Liberty Asia works with NGOs who are on the ground dealing with these situations. And Liberty Asia actually provides tips into World Check about, you know, providing public information about companies that maybe you don't, you want to be, think twice about dealing with. Yeah, I'm sure. So then, you know, we've also been involved with the UN University that did a workshop last summer that provided input into a national, no, the UN Security Council resolution on human trafficking and talked about what kind of data gathering and so on should be encouraged to help mitigate the problem. So we have, there's an opportunity for a virtuous circle where laws like the Modern Slavery Act encourage corporations to then be more aware of this stuff. They have to report this stuff. So they have to report what they're doing about keeping forced labor out of the supply chain. So that means they have to look into it. If they look into it, they need data that encourages people to provide the data, the more data, the more the problem can be mitigated and so on. So legislation like this provides this virtuous circle to create more data that would lead to more enforcement. So we're happy to participate in things like this that lead to that virtuous circle. Right, so that's all I have about, you know, so to summarize what I talked about was we've got this system of identifiers that link to other systems of identifiers. We've got tagging tools that identify the presence of things that have the same denotation as those identifiers and tell you which ones. They'll allow you then to process data in bulk and by doing that and looking across these data sets, you can aggregate information across these different organizations, for example, and then do, you know, start doing things like risk profiling or other kinds of profiling about organizations. Actually, I want to make the list of the tools that, and these are tools that we could use to hack on today, right? Yeah, so a lot of them are great. So what's the first one called? permid.org. Okay, permid. Capital ID. It doesn't matter. I'm making it capital.org and then we're going to see that. So part of that is is TRIT, T-R-I-T, Thompson-Moider's Intelligent Tagging, TRIT. And then those are the limit of the freeware. Then you've got pretty good stuff. Things like you can pull addresses off this, or if you start to write it, you have the address where you can do a look up and find the name. And that's API, REST API. That's, we could do nothing but this for like two full semesters. Like this is awesome. So then you've got databases called like World Check for Risk. Okay, yeah, and then we're going to Human Trafficking. Well, all kinds of, any kind of financial primes. World Check. You want to continue risk? You want to avoid your risk? World Check. Yeah. ICON, E-I-K-O-N has all the financial info. Okay. What else? What else we got? Oh, right, of course. And we got, we did that pretty well yesterday. Block 1 ID, I guess, right? Right. And then some capital O. Yeah. It's shocking that my writing is like this with this weird angle. www.block1.tr.com Yeah. It's lucky that I didn't draw the line down that fast. Okay. All right. And so Amid's going to show us how to do smart contracts. Okay. Now, any questions before we start? Yes. Child labor, human trafficking, yes? No. No. Great. So, what do you need to show to our crowd? Do you have to project from your thing? Do you want to do it right from the hangout? I can do it from the hangout. Okay. Outstanding. Actually, I don't know, I don't know who you are, but I think you're going to be nice if other people can get a squib on who you are and what you do. Sure. We know what you like already. Yeah. So, my name is Amid. I've been at TR for about three years. Actually, a lot of my focus at TR has been doing NLP type of work, so natural image processing, machine learning, been recently getting a lot into deep learning, and so experimenting a lot with that. About a year ago, I got really interested in blockchain and started reading a lot about it, specifically the Ethereum flavor of blockchain. And I started playing a little bit with Solidity, which is kind of the programming language that you use to write smart contracts. And I think, I don't know if you have any questions or you'd like to know something, feel free to ask. I'm not, I'm going to give a disclaimer, I'm not a Solidity expert. And I don't know what the audience here, how technical you guys are, but... This is a quick show here. It's like, who's written a smart contract in Solidity? Do you want anything else? I guess I have. I could do a grad student an expert holding my hand. Hold on. Nothing? No. Okay, so there's several people who I think could pick it up very quickly and then some for them probably would be completely fresh, including just, you know, like a method and a funnel. Like some non-program. Yeah, yeah. So, I mean, if you've written a smart contract, this would be pretty boring, but maybe not boring, but it'll be pretty obvious to you. But, so let's see, screen share, entire screen. Is it sharing a screen or... Wait, this is you? Yeah, that's me. Yeah, I think so. There you go. We got it. So yeah, I'll start by saying that it's a TR. We've been getting into blockchain for, I think, a little more than two years now. We had a hackathon in London in 2016. And just to show you how crazy things have gotten with blockchain, the number, the winner of the hackathon got 1,250, I guess this is pounds, and 25 Ethereum coins. And then the second place got, you know, 1250 and 50 Ethereum. Now, obviously, you know, and the idea here is that, you know, the 1K travel was worth more than 25 Ethereum coins. Sadly, that's not true anymore. This is like $50,000. Yeah. And grown. And grown. So, we had another hackathon in 2017 to give any Ethereum to the winners. Are you serious? Yeah, they gave 10,000 francs though. So, yeah, more in the year. But yeah, so, you know, some of the winners, they looked at the intersection of blockchain and, you know, Internet of Things, the IoT world, or, you know, applying blockchain to fight fraud and supply chains. And we can, I don't know to what extent we can talk about those. That can still talk about it. Yeah. But we might be able to, and I just don't know. Please don't. Okay. So, yeah, so these are public things. And all of these hackathons we're running using the Thomson Reuters to block. So, we run our own blockchain. So, of course, there's Ethereum, but there's another one that we run. And I think you guys were playing around with it on the NorthSport. Exactly. We love NorthSport. Yeah. We're all NorthSport guys. Yeah. It was interesting. I mean, if it comes up and we do a smart contract thing, everyone should learn about smart contracts. So, I encourage everyone to pay attention to this. Especially if you haven't done one. If you end up doing one, it would be great if you could obviously carry the team. But one thing is, it shows how to use an explorer. So, you can go and check some of the transactions we did before. Obviously, like either scan it so forth or point it at the right, you know, endpoint, shall we say. Search a little to do much. Okay. Thanks. Yeah. So, I think, I hope this is helpful, but what I'll do now is this smart contract, which don't even make this bigger. Yes. Okay. Okay. So, we'll go over this smart contract, which basically has two things. One, it has a setter. So, it has a variable that, you know, you can set. And it has a variable, and you can set the value of that variable, and you can get the value of that variable. And it has two other variables, which basically does some very simple comparison, basically meaning, if, you know, if this variable is greater than this one, return this, otherwise return the other one. So, the idea was that you have, you know, very simple auction scenario. You've got some good, and you've got two bids on it, one person bids 10, one person, the other person bids 20. Who wins the auction? The second person, because their bid is higher. So, therefore, do something. Right. Exactly. So, and the idea now is to take this piece of code, convert it into a contract that is deployed on the TR blockchain, so that everyone working on this blockchain can interact with this contract. So, basically, if you have, you know, Ethereum coins, you can call the methods on this contract, which only cost the amount of gas or transaction fee, and should be, yeah, and you can get the values of these variables. So, and it's a little point. So, we've been talking about blockchain, and what I showed at the Discovery Astrolabe was that we met at, is that we look at it as a ledger, where you can immutably enter a record of transactions. But there's another aspect of it as well, which is what we get out with these smart contracts, and that is that it's addition to like a, you know, like a ledger of static information that, you know, is mined in the process. Also, there's a distributed computation environment, like almost like an operating system, in a sense, a virtual machine, that you can run code on, and that runs the code on wrap massively distributed clusters, and basically anyone that happens to wake up one day and decide to put a note on the network is now doing a bit of that computation. And so what does the computation run? Well, among other things, but primarily smart contracts. And so there's a syntax in this language, which is called solidity, that will run certain operators and other functions and methods. And we're seeing one now, which is like a classic Hello World kind of smart contract, which is like the greatest SGO and the greatest, you know, like somebody did something on the blockchain. So we're not like getting data from some alien computing environment just happening right on the same blockchain, sort of if that greater, lesser, the stuff that Brian was just going through. So that's what we're looking at. That's the context. Does that make sense? Is there another programming language that will also create smart contracts? Yes, there's another one called Corda, which runs on a different blockchain. So there's Ethereum, Corda, it runs on, I can't remember if it's Ripple or I forget. Oh, it's the R3 consortium. Well, now it is Hyperlinked Republic, I guess. Exactly. And, you know, every one of these coins probably has their own flavor. You can do a smart contract on the Bitcoin. Can you? Okay. Corda is now a Hyperledger project. Corda was the R3 blockchain that was, they don't call it a blockchain, they call it a distributed ledger. That's important to especially the legal counsel of the banks that work together. That's the aspect of it that they want to underscore. Anyway, so a little bit about smart contracts. So we have the context and this is really, really good. I seldom get it to this part because I'm not, I need to learn how to write them and how to work with them better. But this is, many people when they say blockchain, this is all they need to smart contract. So let's continue. And I guess the thing about Solidity and why it's, why people are, why they like it, is it's supposed to be tour incomplete for, so anyway. So the idea, okay, so let's backtrack. So the idea is to take this piece of code deployed on the blockchain so that all of us can interact with it. So we're going to copy this code and we're going to go to this helpful website, which is called remix.athearn.org. It's basically an online Solidity editor. And you can get to this website by googling online Solidity editor. I'm sure this will be the first slide before we get started. Yeah. And so I'm going to, you know, you can just paste it in here like that. And yeah, so I had this code that I've written and I, you know, I put it in here. And then you can actually right away interact with this from this editor without, and this is just your local, it sort of emulates what it would do on the blockchain. So it's only you interacting with this, with the contract. So basically, if you go to run here and I'm going to create an instance of this contract, basically deploy it locally. So I can do create. And you can see here at the console log, just a little hard to read. I wonder if I can read this. Okay, here we go. Okay. Okay. So this is kind of the log. And now there's, you can see there's two, there's three methods here. One is called set, and you can put a value there. One is called get, and you can just, it's a call method. And another one is called get bigger bid. So if I say, if I just click, if I put a value for set, and I can, you know, put one, two, three, one, two, three, and I click it, once I click it, watch what happens in the console. So it's going to send a transaction. Everything in smart contracts is based on transaction. So I'm going to send a transaction to this contract that has been deployed, that has an address. And it's going to call this method called set, and put, and you know, feed the parameter one, two, three, one, two, three. So then when I click on get, this console should hopefully, so now this contract has stored data equals one, two, three, one, two, three. If I call get, this contract returns one, two, three, one, two, three. Great. And so that's the value that it returns. And if I call this other method called get bigger bid, which basically gets, returns, you can imagine a scenario where two bids, one is 10 and another one is 20, bigger bid, which is big two. So it'll return 20. So this kind of emulates the contracts locally on your own machine. And now the idea is let's take this contract and deploy it on Thomson Reuters, Norseburg, so that all of us can interact with this contract. And so to do that, you need two things. You need the ABI of this contract, and actually I think that's the only thing you need. So if the contract is a thing with an address like a wallet has an address, what's the relationship between my wallet and a contract? Everything has a contract. Everything has an address on the blockchain. A contract, there's no relationship between your address and the contract address. Okay. So some, a lot of contracts actually have a value just like I have that variable. And when you deploy the contract, you set the value of the owner to your address. Obviously. You don't have to do that. Okay. That's interesting. May I ask a question about that? So once our contract is entered onto the, how do you say the Norse? Norse, Norseburg. Norse, just a network. Onto the Thomson Reuters Ethereum, no blockchain. Is there no, I would think that there'd be a way to know which, which, what we're gonna call it, I guess like transacting party that has an address on the blockchain entered onto the blockchain. Even if they don't have maybe an owner field. So is there not some way that it doesn't have to be kind of signed and entered? Like a, I think it's just so how anonymously appear. And then so how would you know how it got there? Good question. Okay. So let's make that a second thing for later. Yeah. What you're exploring number two is let's look at some smart contracts to interrogate the blocks and just see what we can see. Yeah. And I think the thing to make sure about smart contracts, and this is very, very, you know, something that you have to make sure when you interact with smart contracts, what you're going to get is an ABI, which is basically the definition of the contract in this way that works. But you can actually generate your ABI because there are things that take the code, the contract code and generate the ABI for you. And what you want to make sure is that any time you interact with a contract, you're interacting with code that you have either looked through or hopefully understand because you don't want to interact with a contract that could potentially take things from you that you didn't want to. Classic legal example that I feel like it'd be which you have fireable computational law instructor if that's not to bring up right now would be the DAO hub. Yeah. How many people show up hands who doesn't know what the DAO hub is? Haven't heard of that before. Okay. This is important. So DAO hub really important. So just to really underscore this point. Yeah. I don't know how many millions of dollars? What's 10s of millions? 100s of millions. 100s of millions. 100s of millions. 100s of millions. 100s of millions. Yeah. 100s of millions. 30, I think 33, 12. Yeah, sorry. 12. No, not at all. So yeah, for this, so there was Mr. Poppers tells us that our resident crypto genius in the community teleprints to have said some 130 million. So a large amount of money was invested in a smart contract called the DAO hub. And the idea was that people could put money into this smart contract and then it had some code that allowed everyone to put money in, have a vote in projects that the money could be invested in. Like interesting projects that operate on an extended mechanism. Ethereum blockchain. Ethereum public blockchain. And the thinking being that it could be a money making fund. You could make even more Ethereum and also promote Ethereum to some extent. I think by having an investment vehicle for projects there. And it turns out there was a, one of the features or really frankly bugs, according to most people of that contract line, which is that it allowed for a participant to more or less empty out the fund by exploiting, or I would say a unintended functionality of their code. And it raised a lot of major questions. So some of the, almost doctrine or practically feels like theology, through some folks that are all about, we need to switch the economy and the basis of transaction to a blockchain because it's immutable. It's cryptographically, mathematically certain what will happen. So we don't need all these lawyers around uncertainty. Is that they felt like, hey, you could look at the contract. You could expect that you would know exactly what would happen in all conditions if that's where you want to put your money, go for it. And so it had expected results according to those of the people, some people are that you should have known better. Those are the libertarian kind of feeling there. Other people felt like this was clearly a conversion or a theft, or, you know, it would be, it was unintended and it was a kind of fraud, to the point where it was so many people, so much money was such a disaster that they had to fork the entire blockchain. Everyone was minding their own business with their dresses and their transactions. They had to be beautiful ledgers and long reader. No, not so much like they terminated the blockchain, rolled back to clock a little bit, undid that, that set of transactions and then they kept going forward. So they fundamentally had to make like what would be considered a deletion or a rollback or a fork. This is like what you call like the canonical case of like a big smoking crater of a disaster where a little bit, ordering and security at least in the zone that we're talking to you get in like post medieval banking would have done a lot of good here. And so there's some theorized maximalist view of like a barren terrain of free people and free markets, doing and gutting it out in a computational battlefield. It may not be the terrain that's appropriate for all transactions or expectations. So in finding reasonable ways to re-inject some institutions, some rules of reason and the role for attorneys is just, I think, demonstrably timely and appropriate to be looking at. So that's that hub and that's why I think that those last few words really bore a little bit of explanation. Like you really want to read through the contract and have people that understand how to read the contract before, you know, messing with it. Having said that, these things are really interesting. They're really great, frankly, to have a contract that's on a shared network that everybody can look at and something like especially a work-a-day high philosophy, high volume, very repeated, simple thing like, you know, like I brought, you know, 10,000 mops and buckets and I get pain this much. You're going to chip from receiving somebody to check the box. And these mechanical payments as opposed to 60 days, 90 days and a lot of paperwork could be major reductions in drag and needless inefficiency will still maintain a very good high integrity model of what happened in accountability. But for exotic derivatives and like, you know, other banks of financial insurance, you know, perhaps not so much in finding that balance point in application is probably what we want to do, you know, the last part of class when we break into teams and use the technology. So sorry, that was a little bit long-winded, but I want to make sure there was a teachable moment in what you said there. Okay, so back to you. Sure. So now to essentially deploy this contract, what you want to do is I went, I don't know if you guys saw this, but so in this editor, there's a run where we can interact with it just locally and then there's compile and if you go to details, you scroll down to the Web 3 deploy here, I can just copy this, paste it, you know, here and call it something different, call it, actually, this is fine. So make it my awesome MIT contract. Okay, that's fine. Awesome. And you can do this kind of thing to make people happy. Okay, all right, so okay, this should work. So now you can go here, which is, I have connected, so the word is here. Right, so let's take a step back again. And so if you go to Block 1, which is the Thomson Reuters blockchain kind of umbrella, and you look at the NorthScore page for documentation, it's actually a very helpful instructions, but how to send yourself Ethereum coins on this blockchain and how you can kind of get up and started running a guest node, which is a miner, but you don't really have to do that if you want to interact with other contracts and so forth. But running a guest node is essentially running your own miner locally in your machine so that it connects to the TR network, but also you can, everything that's happening on the network through your machine. So I downloaded the zip file and that had these files here. It has this folder and basically you just run your NorthScore node just like the instructions say here. So unzip it and then run this. So then once you run that, it takes, in the beginning, it takes about 30 minutes to download the blockchain and synchronize with it. Keep in mind if this was the Ethereum blockchain, it would take probably a full day, if not more, because it's very big by now. And so once you do that, you will end up at this console screen and hopefully I can excellent with this. Okay, so we have this console screen. Now I'm going to take this code and deploy it and basically just paste it in the console. Hopefully it doesn't really make sense like this format just because of what's happening here, but if I press enter, you can see you have a transaction hash, right? Every time you send a transaction to the blockchain, you get hash, which you can then use ether scan with as I was saying to track the transaction to see how many confirmations it has. And basically wait here is because the TR blockchain has set the difficulty of mining these blocks as very easy so that I'm right away because we're using it for experimental purposes right now. It says the contract has been mined and it has an address and this is the transaction hash. So this address is the address of the contract. This is what you can use now to interact with this contract. And so now let's see how to interact with it. So what do you mean transfer from this wallet? So every wallet has a... No, no, so this contract is now on TR's blockchain so that if you connect to TR's blockchain, you'll be able to interact. And all I need to really give you is the contract's ABI and this address. Now again, don't ever trust an ABI. You always ask to see the code but in this case, sorry. ABI stands for... Something, something. It means, if that means, let's see. It stands for, I do want to know it stands for, I'm sorry. Yeah, that's fine. Application binary interface. Cool, application binary interface. Okay, so... So what do we call... So now we have a variable called my awesome MIT contract called the variable. I think we're feeling good. Or do we not accept the variable? I think it's this one. Yeah, so there we go. So we have the ABI and we have an address. So this is the contract ABI and this is the contract address. And these are the functions that we have. We have a get function. We have a set function and we have a get bigger bid function. Okay, like a cartoon, like a contract you could imagine. Yep, okay. And now let's, so remember there's one, there's a function called get bigger bid, which if I call get bigger bid, can everyone see that? Is that too small? My eyes are terrible. I don't know. Can you see that? You can? Okay, so I'm just phoning my bad eyesight. So we have get bigger bid. We can call that and it's going to return the bigger value of the two bids and hopefully it returns 20. So it returned 20. Now to call functions on a contract, you don't need to actually use any gas or any fees. But because it's not actually a sending transaction. But let me take one sense. What that means is we haven't mentioned that one of the sustainability, almost like infrastructure sustainability mechanisms of blockchains really from the like Satoshi's papers, where are at least what we call an ethereum gas. And so let us just characterize it generally as small transaction fee, but it adds up. That is like assessed to transactions and that goes to minors and goes to commercial parties, okay goes to minors. And so you need a certain amount of gas to make your transaction go. If you want your transaction to go fast, confirm fast blocking, not ethereum gas, which means there have been transactions which have like $20 transaction fee just for it to get fast. But ethereum is still okay. Yes, it depends on how difficult and how many transactions go on this block and basically how fast you want it to be mined and all that kind of stuff. All right, so that's calling the method. Now we're going to set a variable on the contract. And so to do that, we actually need to call the set method. And then we're going to send a transaction to the contract. So it's going to send transaction and then we're going to keep the value that we want to set the variable to. So I'm going to say 450 and then you have to give it from where the money is going to be taken to use up for the gas or the transaction fee. So I'm going to say from my accounts, which is stored in pay accounts and there's only one account on this right now. If I press enter, it's going to send the transaction to the blockchain. So you have transaction hash. Everything in blockchain has a hash. That transaction has to be mined. So you can see that it was mined. And now, mining, what do you mean? Yeah, so basically there's all these computers. The mining farm. Yeah. That's the energy cost. Right. Because you have computers running to mine the coins to drive the whole system. So you people would see both these computers and they cool them down to try to make them faster. So basically there's energy that's running on this farm. Well, yeah, there's buyers that are actually largely here. The theory was if you distribute like the steady contract almost, you will be doing those on the cold computers and like a little bit of server farm or on downtime, what's ended up happening probably because the incentives of getting a certain amount of the transactions like Bitcoin or Ether is significant enough and the value is going up high enough that there's a major concentration of mining happening. China is I believe isn't that not the biggest one actually. So that's also why the Chinese government said they're going to start, you know, controlling the energy going to the miners. That's why Bitcoin dropped that day. And then they say that. Real questions. And it didn't necessarily be this way. So I mean a major part of the work in the Media Lab digital currency initiative in other places is plus your other incentive formula that we could use. So I mean this really might have proof of work with the cryptographic mining, which is very computationally intensive and that may not have the perfect set of incentives and disincentives based on the vulnerabilities that are happening at high concentration, maybe an adversarial nation or people in collusion that may have a 51% attack and I've got a thing on the blockchain. What could you do based on proof of state for example? So I don't know, like if it was like a NATO blockchain, if you're a member of a nation, you run certain amount of nodes, maybe proportion to your contribution or to your core structure or something like that or two. And so, you know, like this is very, please hear this as something that's in play and then you can get your mitts on, you can start with fashion. So now that we have sent a transaction to the contract and you're interacting with it, we've set the value of that variable and the contract and now if we call that, we call the get method on it, it should return the value that we set it to, which is 450. Okay, great. You never know with live demos. And now the interesting thing is I have, all I need to do, all I need to do, all I need to give you to interact with this contract is I need to give you this ABI and I need to give you the address of the contract. So then you can say on your machine, you can say my new contract is going to be an F contract, which is located at, which has this ABI and it's located at this address. And obviously, you're not going to have these variables, you're just going to paste this thing here and this thing here. You can't really see that, but yeah. Is the smart contract, I think the incorrect word, exportable? And the reason that we're going in that is how do you conduct the discovery of smart contract? How do you admit it as evidence in the court? What is the format for that? You should stick around here longer because we love ourselves admissibility of blockchain evidence, mock trials and moving parts, but it's fun. Yeah. So basically, all you need to do is that and now you have this variable and if I call get on it, it's going to get 450 and it should do that on your machine as well because that contract is now on the blockchain and is a public contract that people can interact with. Oh, well in this case, it's just an example, but you can get, for example, imagine a contract for voting where you have two candidates and each candidate has a certain number and you can you can vote for a candidate and then you also want to see who has how many votes, right? And so you can call, you can make a method that returns two values, one for candidate A, one for candidate B, and that will correspond to the number of votes each one has gotten. So if I wanted to set the value now, if not you, I could, it would cost me some money to set the value and then when I did get it would return the value that I set and anyone else who did get would see the same value. Correct, for Frank, yeah. Take a quick shot at answering the discovery question. Sure, go for it. And then do you have more to show? No. I'm going to answer the question then we'll go to Brian. That's right. So there's a question about what would I, what if there's e-discovery on the contract? So it looks only going on the contract, like you'll see that how the requirement is in litigation, for example, people want to do, introduce the Dow Hub Smarter Contract into evidence, like we can, this would be very foreseeable litigation over the Dow Hub contract. Like I can't imagine how any cost set up as an action would be entering that into someone, if you're relevant to certainly contract breach and other misrepresentations and on and on, you know, there's, and so that's a good question because I don't believe to my knowledge no one's ever had to do that before. And so in this very room, a few months ago, Christian Smith and I and others did the beginnings with Massachusetts Legal Hackers trial to enter into evidence under the Massachusetts Rules of Civil Procedure which I think we recalled. And we have some current litigators in the room with us. Basically the witness laying of the foundation and the first thing we poshlaid was a contract breach and we assume, and we've further poshlaided that we were looking for the business records exception because we, you know, you have to apply a lot of facts. And then we, and then we had a person talk about how like my job at the company is, is where's the effect of working and doing the blockchain based transactions and I keep my records in this way. And this is how the technology works, which was a lot harder to explain as though you're talking to a judge or a judge than I ever imagined. So we learned that we need easier, simpler ways to do that easier diagrams and explanatory things that you talked about in court, which was a skill we can have in the house, we identify that. And then we, and then at the end of the day, what we felt, you know, just by researching development question here, which are going to be our best bet would be to do a printout on paper, I'm embarrassed to say, as like exhibit one, exhibit two. And where I wanted to get, and where I feel like we ought to get is like just completely electronic, maybe print out for some kind of archival purpose, but the authoritative thing should be something we display in a screen in court. And the judge ought to have it and explore and be able to do the same things that the counterparty should be able to hack at it. And, and we should be able to show the code, we should be able to enter it to evidence the then current version of solidity or the programming language. And I would say, honestly, the full blockchain as it existed, at least as of the time of that transactionalism, the relevant span of time, which is, as I mentioned earlier, is also a little bit of a lift. Maybe this is in so much of yours, but Bitcoin and Ethereum, blockchain, putting it like in a CSV format or something, anyone could ever understand is, is a whole thing. So there's to be some of the rudiments we imagine would be necessary for laying foundation for to enter evidence under rules of several procedure. But I used this as a thanks to, um, like some lesla searches and stuff like that, just how do people enter other exotic electronic evidence into electronic, yeah, artifacts into evidence and just how do they lay that foundation where the objections were very, very instructive. What I looked at, how do people get checked off doing it? How do we not get checked off? But as far as I could tell the major, major issues aren't like there's some, the rulings that you know, it's a record. There's a transaction, there's been a dispute, you know, common law courts are fantastic at our administration justice can adapt to these new things. The real thing would be the mitigators, the Jagger and litigation. But what do you say when everyone's looking at you and you have to make this understandable? But come on, this is like, this is going to take work. I think this is going to be like years of CLE and like, you know, walk trials to start to hone this and we'll have to really keep our ears open when you hear the turn of phrase and when you see the good diagram and start to accumulate this stuff into practice, practice pointers and, you know, manuals and just getting better at it. So does that make sense? Does I have a question? Since smart contracts were written in code, they're in language, is there already established language for certain functions, like for example, that, you know, the bigger bit was, is that something that is already previously written so that you can use kind of yours? So you're talking about, so I think in, in programming, that can sometimes be called a polymorphism or inheritance, where basically you, you write a contract, but instead of rewriting the wheel, you just say, let's, for this part of it, let's just take it from another contract. I think you can do that with Solidity and Eno is better. So you can do that. You can do it with, like, the way you're talking last time about, you know, mistaking everything you can do. Yeah. Because it seems to me smart contracts are really a border of operation. Yeah. Functions, right? Right. Yeah. So, and that's the thing, it has to be deterministic, right, because a blockchain is deterministic. So, yeah. Any other questions, college? So I had a question. So someone risked me off on Ethereum and I was president. Yeah. So I know the address of the wallet where, say, where I think my money ended up or I know the contract that we took money from my account or so on. Can I sue, you know, the owner of such and such address? You don't know the owner of the address. No, I know. Right. So can I? He's deliberately asking this question in this way, because he's a funny guy. So is that a setup for me to talk about kind of thing those thoughts, principally? Yes. Okay. So I'll just say a couple of things about that very quickly. So, you know, that's a good question, right? So it turns out that unlike, say, like, you know, like a NASDAQ or like a New York Stock Exchange trade action with registered brokers and dealers, that, you know, the address at the postal address of the, you know, the officer to whom legal, like, service or process would be presented isn't one of those fields that we saw in the blocks in the blockchain. So that's a pickle when you actually want to, like, get a sheriff over somewhere to, you know, to get someone to struggle the neck and like maybe impound their car, you know, to compensate for the ripped off value of the transaction. And so, you know, one thing to say about this is that blockchain is not an anonymization machine. And so there's a lot of signals traffic that you can get with IP addresses at the end points even purchasing for. So if you really want to put some, you know, shoe leather into an investigator's ways to put it back together. And the other thing to say about it is that, like, like, we had a great MIT legal forum thing here where we were legal forum. So where we where we talked a lot about something called dual integration and monies calls it that sometimes we'll call it different words work. But basically the idea is if you want to do by your counterparties, you can include it like off return or in the memo field, like the we've used the perm ID, or you could put some some other identifier there's and you could also link to the legal contract. If it's like on a public procurement site, the URL in the URL, you can include the address on like the period of blockchain of this smart contract that's connected even the addresses of the counterparties. So you can basically do like cross reference if you want to maintain problems of legal entity identity on the blockchain transaction and blockchain addresses and transactions on the legal contract. And where I where I do that when I model that, I haven't done a proper deal this way, but I'm just modeling it. I've done it like a between like acne corporation and data corporation company in New York with blockchain address and this kind of track correlates to the smart contracts of this address. I just write it out. I don't really I'm not interested in making it hard or confusing. So that's what I think it's a live question. I mean it's a live question. He's got a live question. Isn't that the idea also of the identity of having identity on the what we're doing like in this session class? The purpose of identity is so that we can't do all those kinds of things. Is to create that one universal identity that you have been used for. Yeah, there's an identity aspect for questions like what which identity is the reason what identity functions and services are necessary and when do we want to allow whistleblowers or others to actually have some pseudonymia and how do we accommodate these use cases. So yes, yes, and yes, sadly, and we're going to sadly the show is coming to a close soon. So we're going to change the format a little bit at the end from breaking into groups where we had timed out because I didn't expect to get so much great more education. So I don't want to short circuit the education and which we have actually now available on YouTube. So all of you go back to your offices and there are other countries and things connected to see this, share it with your friends. In part, you're welcome to of course more questions here. We'll be here and we'll keep collaborating with the tonsure writers labs and others and the channel open. But what we'd like to do instead of at the end is more like a discussion. So people can talk about the use cases as a group and back off in that way and to start with superstar legal hacker and the first like like you know like like fully authorized and deputized teachers assistant computational law course, Brian Wilson has actually done a proper hack from the use case. And I just asked before you have to rush off to get your get your training if you could walk your story. Yeah, take it away. So with with this whole course, one of the things that we wanted to focus on is the obviously the very amendment by American Act, but we wanted to kind of generalize that so that you could identify the provenance of a good track it throughout the entire life cycle of that good and determine where it came from. And on was that Saturday? Yes, on Saturday or no Sunday on Sunday. Yeah, late Sunday night. We were trying to figure out ways that you could do that. That would be easily hackable and wouldn't take very much effort. And we found or we stumbled upon crypto kitties and we're talking about them and noticed how they all have unique features. So on this page, you can see some of the features include fancy and chip guy, but you can also track the the provenance of these to their parents to all up and down this this chain of things that happened to them. And we were like, well, that's pretty cool. They all have these different they all have different features that are unique to them to represent specific traits. And so our next thought was, well, what if we could take a hash value and then somehow generate our own images that could be placed on a good or something and used to track the origins of that good at each point during a supply chain. Yeah, could be placed on a label on a physical good could be embedded into a digital good. And we stumbled upon identity.net, which creates really cool unique images based on exactly what you're typing. And if you even do something so much as change the capitalization or delete a space, it will completely change the image. And so what we wanted to do to kind of prove this out a little bit was to take hexadecimal hash values from the Ethereum blockchain that are used as real transactions, put them in a table, then figure out a way to insert the images into a different table. And this is what we kind of put together so that you could see each time maybe a good goes through another supplier or distributor, they could insert one of these images on it. You can make sure based on the all of the transactional information that is stored in these hashtags and represented by these images, you can have a greater degree of certainty with where the provenance was coming from and use that as a way to identify, for example, that your goods were made in America, as you need to for the bi-american act of clarity. So, ta-da! Nice hack. This is the way we hack the law. All right, so any questions or comments on all that? I'm sure there would probably be a way to reverse engineer it, but they have the so identity has all of their information on GitHub here. So, I'm sure if you toyed around with it long enough, you could figure out how to reverse engineer it. So, so being able to like, like go backwards, so from the image into what the hash was, I don't know, for a retort that looks like it has the properties of a one-way hash to me, it doesn't seem to retain enough information to be able to do that. I'm thinking like supply chain, let's say, but so there's an issue happening, the system that drives to the compliance of this. If you have like every time this same supplier is going to be a different job, he's going to be happy to run it. Backwards from what, to what? From the image to the hash to the hash to the transaction. So, a major property of one-way hash functions is that they're one-way in the sense that there's just insufficient information from like a 26, you know, digit string, ever to derive that it was the Library of Congress or the entire Hubble, you know, telemetry or, you know, like a five-line poem. Just there's no way to know that, like you have to go through every combination of characters and, you know, and like ask you or other sequences until you get the same hash result and like that's obviously very difficult and that's also partly why they're hard to, why they're good at being checksums. And so, and why it is that you know to really like a very, very high degree of certainty that a hash that results from a given sequence of information is definitely that information. So, it certainly ties in that one direction, but there's, but we want short hashes, in this case what we actually want to trade off in terms of it not being two-way verifiable. But what's great about this is like the CryptoKitty, which is what I started this, is that a human being can look at this CryptoKitty or can look at that square and then we can just, we're good at the processes in our head to distinguish the difference. So, you've got a monitor, a person shipping and receiving, and we look at something on a box and look at what they were expecting and say, is that the same? Pure of our code, not really. Now we're into hard manual processes or like, you know, imaginary, never quite work, robotics, shipping and receiving, things, you know, we're still a ways off here. But now we can have everybody understand it quickly. Let's let some more people talk about it. Any more own questions or comments? So, if you created a, like a digital way to store these as receipts, kind of, you could have the, you could just make sure that the two matched up. So, the hat or the identicon that you would start out with is the same at the beginning and end. So, that would be a way to kind of like get into more of the selective privacy, selective disclosure and continuity. So, it certainly has continuity, but so it's adjacent to reverse. Mila, did you have? No, I like what you just said, you know, in a way that you can't keep a record that it's all possible, but you don't have to just close any more information than you need to make sure that someone could be accountable for it. It's pretty great information. Hopefully. Yeah. Using this for like a supply chain, so it's attached to a good, how do you track like what the transaction has gone through to make sure that, you know, like a good action delivered to the person. Because we were talking, but I couldn't right now. So, you could add at each region that the good travels through. You could add another row. And so, when the good starts out, you have like just one, but after it goes through all these people, it has like five or six. Kind of in the same way with the cats where they had, you can see parents and children, but you can go up and down that chain and see, okay, it started out here, then it went to here, and based on the like totality of the images, you can see that it has gone through each of the right places. But you need to trust that. Like if you had a contract where, okay, I saw you with an apple and you received the apple. Do you trust that? Do you trust me first or do I trust you first? I guess that's the question. Like how, yeah, how did he actually execute it? I think that in the diamond industry, when they started, they stamped some kind of a picture of the actual diamond. And so it can be checked all the time. So that is the correct hash of the image that's been, and I think it's a 3D thing with like some complex number that's stored and that's hashed. So the end result has to be exactly the same. So if you travel around, it doesn't really matter. You take the same machine and take a picture and you're supposed to have the same picture. But so, you know, like in some of these cases, there was a selective disclosure on that item, right? There was a tag that said made in China, but then that tag was switched for a tag that said made in the U.S., right? So isn't there, doesn't there need to be some requirement that this couldn't be to, you know, associating this identicon with this element and that somehow has to be integrated in some way that couldn't be switched out, right? Precisely. So I mean, I know that you need to, unfortunately, but before you do, you have to use the other one. Before you do, we should probably get up to the point we love to get to in this course. One of the first ones that we've taught, we've been trying to learn blockchain is called napkins to launch because you always hear about like the myth of who's crippled something on the back of a napkin. It's a lot of value now. It's just a lame dollar, you know, the juggernaut of technology. So we were encouraging student projects like that. We actually taught quite a few. So on the napkin last night, you should have that on the wall right here. Okay, perfect. So let me see if I can talk through it. Or who else was on the team? Well, okay, so basically I'm just not going to be great. Great way to say it, but part of what it was the picture, really, but it didn't go to the napkin. We didn't. Ah, okay, talk through it. So let's say you started T1 with, you know, like, T1's like the origin point, you know, like ammo, paste, or, you know, it's like you care about where the materials are sourced, you know, if you dug something out of a mountain, you were flying something, you smelted something, you cased something. But here we go. Yeah, this is it. Yeah, this was the napkin. It's reversed on the screen. I think it's reflected on the camera, but it's okay, probably. Okay, power saving mode. No, no, no. I think it's backwards, right? Just keep it guess, right? Oh, I think actually it comes out on YouTube correctly. There's some trick of natural language, media knows, and maybe even a unicorn. We're lucky. Thank you, Eli. Okay, what do we got? So, to take it from a weird one-star plan, like you want to, I think in the movie Boredog, we start with we acquired a bunch of ammo. Yeah, so you get the bullets. Well, the bullets come with the, this logo on them. And you can see this on this logo that you know what it is. But when it goes to the next person, you combine another logo with it. And so it keeps creating a unique logo. And it's represented here by what looks like a letter I. And then you can keep doing that at each different point throughout a supply chain, and make sure that this matches up with this labron. If you want to audit and ensure that the origin of the goods is what they said was. Because you don't know if somebody decides to change their mind or not. Yeah, so it's additive, basically. And part of what's good about this, so it doesn't quite what Oram was asking about about the, you know, can you get to the whole payload from it. What it does give you, what providence is your question, as it would be with something you know of the type of bimeric and variant method. It was so many things, diamonds and so much. Being able to just look at the label, let's just say the label says it has like the legal label. You need to think through what are the data elements that we care about. But I'll have to find actually the peri amendment for the other acts. I looked at the diamond things like we could, there's probably an industry standards, some others that would be key details to go on and follow the name, perm ID stuff, and like how much, how many pound digital, so they can model stuff and things like that stuff. Transaction code. Figure that out. Put it on with passion. Generate the image. And now we've got a new place. Now, guess what? We've got a new label, actually, too. There's a new stuff happening. It's been shipped and received with FOB. We take it right through the supply chain. And so you could actually, you should be able to look on the box visually inspected. And then you could reverse engineer if I add this image and that image, do I get this image at any point? And if we get variants, you could figure out this is exactly where the problem is. It's like when it went through this port and this island. But then someone has to have to realize that the full, the full chain. I was saying you can add the stamps directly on. Because I'm thinking like for kosher food, like kosher food, they have a full supply. Not say like five hashes ahead, there is a problem. And if they want to fix the problem, holiday, localize, specifically if nobody has them, organization on top of it. It's a transparent chain. Yeah, one of the postulates that we're making here with this property, I would just say, it's like this is novel, I guess it says, but like, and actually probably when you pack them, they just listen to what I'm saying. But I think in practice to reduce this technical innovation to practice in a way that is commercially viable. And that answers the questions that would come up partly from law. So if we have a dispute over origin at some point, what would you enter into evidence? What would you care about? And let me just play out that scenario. I think what I would do, I was like the person that had to do the application of identicons, or particular to a supply chain. I would, after painful meetings, have every ball of corn in the supply chain agree, we will literally have a slip that has over much space for each square that we would ever want to add. And we would keep adding the squares to the slip in the order of the sequence, which we would fight about with this vertical or horizontal and everything like that. As we go through the chain, and that in the extraordinary circumstances that we ran out, we would agree after fighting more, we will add a second big thing on the writer believe not the lower part, oh my God, that's dangerous enough. You have to fight about this. You would come up with a practice, but you would have to have, you would want to be able to visually scan every addition to this and have that be part of display payload. So we would be talking about basically like a D3 implementation or something with something where we have a standard way to have a card and JavaScript and that would show them the doms. I would do what I would do, it was digital and otherwise I would just be right back in the legal land to the RFID people and the CRO people, it was standard for all that stuff to add and stuff on. So I think that would be part of the idea that it's got to be additive, because if you just take it a sequence in time, you lose the prominence. Makes sense? More questions? First of all, I just want to, I think to come here. Do you have your coin? Okay, thank you for being a great first TA in the first class. Let's hear it for Brian. Here, here, and you genuinely did. So next to you, you've got to be teaching this class right now. You're saying it. So come back. Yeah. Okay, thanks. Come back and stay proud. Legal hack right there. All right, so let's have a quick conversation about where we're at. So it's now 4.10. Oh, no, that's sort of, doesn't that mean something? So there's a, or 4.10 is like a zip code or something? Not that. I'm actually, I have no vices right now, which is probably my biggest problem. It's not healthy to have no vices. So, uh-oh, nice little play. So quick time check. I think we're scheduled to end at 4 o'clock. Are we not? Yeah, we're scheduled to end at 4 o'clock. So we could pack our tents and go home now. To anyone that wants, that needs to or wants to go, is free to go. I should say that for short. And then, and I'd like to suggest, my schedule permits and we have the room. So we could also stay on another hour, maybe, and wrap up at 5. And we have time for, what I would suggest is not group by group presentations or work. I don't think we have quite the time scale for that. Also, it's going to be a little late in the day. But I think an open discussion that maybe could be grounded in some of these cases and look at what I think might be, and what might be called for. It's just kind of been also a synthesizer of what we talked about and learned over the last couple of days. What are people like for folks off the floor? I know. Deanna's down. Two. That's two. Ten minutes. Three. Three? Who's third? So, show of hands. Who's up? Who's able? Who needs to go? Let's start with that. It's okay. I think we're good to go. So, 5 p.m. is it coming down? Okay. So, do you want to take a five-minute break? So, five-minute, five-minute break? So, anyone need water or coffee? Yes, please. Everyone needing water or coffee? Follow me. I didn't have vessels. All of you was live. So, thanks so much for doing this. So, we're all trying to do it. We're having fun. We'll see you in five minutes. So, I don't know if the controller is out. I was thinking, let's say, the product has to have an agreement on the supply market. And maybe for one type of supply chain, the same supplier didn't have a profit. For another two, they had a profit. So, how do we know before like closing like one-stop shop that I know this company's going to give me the whole of the room? How do I know this company has to give me that? So, I don't know if every company has something in one house, but then if we get to the point that every type of product is changed a little bit, maybe someone's on the bus to buy it. So, there's actually other options that are really good for having a profit chain. So, I was always excited to meet you. So, maybe you need a parent company. I need the whole of the supply chain and then each one has a side change. It looks like there's always other points. Because I got to think about, I keep kosher. The whole cash report was like crazy. So, even though we know that clients are kosher, we need everything wrong. So, it's just like, again, unless they continue to be kosher. So, there are some things that we haven't visited. We're not just discussing. We have a red light. It's common. It's like a joy to enjoy. Yeah, it's real. It sounds like it's real. Yeah. So, it's a joy to be kosher. And now, we're just going to take a lot of money to be like kosher with a chain. That's one of the discussions. Like, how do we know that the off-chain on which makes the company really be updated? Because it's always on trust. And then, when the small companies don't break the sales, they ramize it like they don't have many years to do it. You can make it in your own blockchain, in your own ICO, and it has hundreds of millions of dollars. But if you, you know, if you're pretending to be kosher, and you're someone, you know, deceiving your boss, and you and your faith, or it's no fault of yours, right? We've got a live question. We weren't talking about kosher law. Maybe not to be close to everything else, but I think it's a good application. So, is it interesting? Kosher? Yeah. Yeah. I don't keep kosher. I mean, there's a lot of, yeah. But an interesting use case, I think. Yeah. Okay. So, let's keep it as a live use case. I like that it's commercial, it's religious, it's, you know, retail, it's got a lot going, and it's just our location. Yeah. It's a good one. It's a real good one. I want to talk about it. But, um, so I think we had a question. So, the question that just came up, which is mostly for you, but I'd like you to answer too, is the cover innovation that Miro was just asking about, which I'm going to try to tell you. So, if you imagine, you know, it's like point one, I don't know, manufacturing, manufacturing, point two, it's like shipping, you know, shipping, you know, to, like, the warehouse, point three from the warehouse, you don't know what that's about, it's just, it's like, oh no, I didn't know. There's a record that's like, I don't know, I'm gonna go, I'm gonna, I'm gonna, I'm gonna, I'm gonna sign it. Right down here, down here, I'm gonna look on Super New York, I'm gonna sign the marriage board, UPS versus, like I said, still there, I know. So, I think it's a terrific and an interesting source. is the source. Could these things actually be true to us? Some of them are true to us. They've changed things. Some of them are false, some of them are false. There are some of them that's part of it. I can't remember the other ones. I don't know the other ones. Yes. Yeah, yeah. So there's smart contracts that are missing. There's missing transactions that are happening on the block. I like it. Yeah. I like it. I like it. I like it. So it was making use of a little bit more complex, which is why I wanted to talk about it. So what we're imagining here is not that there's a supply chain that occurs solely on the block chain, but that it's happening in literally, just to say 3, like, a moment be like 2, like there's enterprise shipping and receiving the desolation by the SAE. And then here's the UPSC, by the factory market. So we're not only setting up a new product to supply, but it's currently, I know, a smart contract that's triggered by financial exchange rates and stuff. But it's not a protocol that says this is coming into the business. This is the word to be used in the UPSC. Yeah. So is it going to supply chain thing? I think it was the way to do it, we couldn't direct the vote to the SSI because it's not recorded as you're trying to do. But we can pick it up on the news feed. So if we basically had to repeat it on the news feed that we had control over and that we were ingesting, we could fake it and think of it. So if we just pay the bill... You know what I mean? Like MIT has a new talk. Like I could probably talk to them into doing something if they're reading, they're like, you know. I don't know. And it's a service that monitors changes in the world. You would be a miner, you know, you might have a website, and it constantly goes after events from UPS, and any time someone signs a packet, and you actually get a packet, or your service gets that, and then fire is also needed. You know, a service needs to be fired right now. Yeah, and if a service needs to be fired, it could do that. In terms of rogers, you can interact with people in such a place. The other ones get out of range, like I mentioned, you can get up at a company, or you can go to a store, or a place, and you can write your own board. It costs a little bit more than that. It's not too much, like a little bit like you get in $1,000, or like you can send it to a online company. It's just a chance to do it. I think the low-jolid, the high-priced budget is very good, and I have to check what's in the waiting average. Yeah, if you have any questions about this first thing, I'll just answer it. Is anybody coming into this session? I think Brian, I've got an idea. Remember how we were talking about small responsorship from Thompson Reuters? We should better figure out these kinds of things. What is next, what do you say before the end of this? Is it like, I think they're not a direct sponsor of the people that I've been up to, like, you're here as far as I know because we want to be here since the middle of a work day that you guys are here. I think that that's much of how the public of the public's relationships are treated. There's some angle that may be made the mistake of saying it doesn't make a lot of people sound like that. Indoor's better advertised, but we do have to act higher against it. If you want, maybe you might want to say it's so important, but I might want to just say it like everybody, but actually, you're here all in paradise and tired of fighting. It's not part of any business, like you see whatsoever. Just think of how you say it, and it just allows people to be able to hear you say, wait, I think it deserves, which is extraordinary. Like, I think your contribution is really, like, it's really, it's a great kind of connection that they have with the public. I think it's a local show. I'll state that. But having said that, now that we're all feeling good, here we are. He told me that there's like a little bit of money that needs to be for more colonized, not a lot. But then it would be more than enough with it like the small amounts of pizza and other sort of amounts of money we talked about it for a year. I think if we could get that going, I would like to kind of continue working with it, which would be the one thing that we could organize and then try it on the top so it's not just changing. Having that lead time with people that are more sensitive to look at what might be appropriate in the order of going, which would make it a lot easier to test a lot. And maybe they feel safe trying some stuff. You know, happy choices on their one chance. Awesome. We should get people to set up an oracle on our end too. You don't need to use the oracle, I suppose. You guys can write the code for the oracle and you can just do it with this. I can tell you two that we'd like to be able to do that. If you had to do it on your own, it's just like a theory of doctrine. So what would be the number one is to get it. There's a lot of ways to get it to a right percentage. In any event, when something happens, it's like when something happens, it's very interesting because it's got a robust insight and everyone knows if you like it. In fact, you can't hide the secret accounts and like. The second one, in my book would be yes. You know, or the other things, or maybe both is what we have to do. Just because that's a theory, that's legal and they don't understand if it's a state change that shows a lot. That's good for a lot of us. Those have been what I thought would be my talk. That was actually just do it, you know. You go back. You don't think it's going to be yours. You have to think a lot of people have that. I don't think it's going to actually roll it up. We have to think a lot of people haven't got it yet. March 16th, 17th, and 18th. It's the computational law and blockchain festival. It's going to be one of the next training for some of these things. But we could put it up for a few people. So we could have people stay there. We could have people stay there. March 16th, 17th, and 18th. Yep, it's over weekend. So I think it's going to be sort of easy. It's going to be a lot easier. It's safe. Work on a vacation. Oh, good. It's safe. It's safe. I'll put it up. You don't have to mention it. I'm just thinking of having the card for some of that one. I'm just thinking of having the card for some of that one. I'm just thinking of having the card for some of that one. This will make the most of it. We have a lot of using it. And then we love that. It's going to be a computational law festival. Like, it's perfect for this act. We have to have the songs delivered. Let's do it. Okay. All right. That's awesome. It's going to be so easy to work with. I've never asked you something like this. It's never going to happen to us. I don't think it's going to happen to us. So maybe it's going to happen to us. Maybe it's going to happen to us. I like to post. That's great. No, the answer's messed. My point is that I have a couple of questions. It's about to energy that. Yeah. It's about to energy that. Oh, yeah. That's the point. I don't know how to. Yeah. It's about to energy that. That's right. I can tell you how these questions are. And this isn't going to happen to us. It's going to make the most of it, I mean, actually, Python's running in the Amazonian ways. Yeah, Python, I really like Python. I've been using Python for three years already. Oh, yeah. I just, I just, yeah, I just wanted to show you the level 3. It's cool. It's, you know, it's just doing it for hours. Yeah. Yeah. It's a slow starting, but then, you know, once you get the hang of it, it will start to move forward. Yeah. Yeah. Yeah. Yeah. I think we should wait a little bit. Yeah. I think there's value to understanding. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. It's a great challenge. Do you want to hear a little break? Can I have an announcement right here? Feel free to reach out. Do you mind? Yeah, my eyes started spinning. It was our first learning. I'm coming. I can probably not make it. Yeah, you can find me on LinkedIn. I'll find you. I'm going to walk through it. Yeah, if you're not interested, please contact us. We'll see you in a minute. It's so, so true. I don't understand why you're here coming. Sorry. Yeah, I see. I've been in here. No. No. So. So many great people here. We'll see you. Thanks, everybody. Thank you. Yeah, it's on. We're going to take a look at some of the things that we're going to be talking about. We're going to take a look at some of the things that we're going to be talking about. I'm going to say it in English. Oh, my name is Wanderer. I'm a scientist. I'm a scientist. I'm a scientist. I'm a scientist. I'm in the US. Oh, that didn't seem right. Woah, that's a pretty good one. I'm trying to make something up. I'm trying to make something up. I'm trying to make something up. This video, I'm going to have to read it out. Yeah, wait and know what I'm talking about. Yeah, okay. So it's going to be about, yeah, that should be, yeah. Yeah, the same JPA, too. Yeah, the same JPA, too. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Okay, nice to meet you. Yeah, nice to meet you. Yeah. Yeah. Hi. So, yeah... so, Enjoy your life, and caused, oh, be that as well, I'm like, oh, and it's just like, yeah. Can you last sound, huh? Yeah, this one was at the hook, but you give it to me. Thanks for making it for us so long. That piece, we're gonna switch it up. Thank you. Thank you so much. Thank you. Thank you so much. Thank you. Thank you. Thank you. Thank you. Thank you so much. Thank you. Thank you. Thank you. Thank you so much. Thank you. So refreshing. Thank you. We're gonna prep that open right soon. All right, cool man. Cool man. Cool man. Cool man. I think Pusty's got something to do with you. All right. Is this me? You don't want this. This is yours. Oh yeah, that's mine. That's mine. Is that what? It's my gass. I can't take my coffee. It's my gass. I got this for a long time. Backing on the week and I was just watching the time here. It was about a year ago. Just about talking. You had purchased it for someone one time, right? Pusty could see like where the Pusty was by. Oh I think that's better. Do you want to say any other questions that we'll get started with? Sure. Oh, yeah. I'm going to start with a number of questions. OK. If you can see the problem, it's worse if it's like you're not a person bathroom. OK. OK. So who's? Yeah. All right. So I recognize you all as the die-hards. That's awesome. Perfect. So what's really the survivors? Many people have a point. All right then. Let's get it. Let's reconvene. Hi. Thanks Lisa. Hi. Follow us over member. Right there. Yeah. Next, paper plate. I have mine. Then you do. Right there. That's it. Oh, a little bit of the batter. Crush. Crush it into the lung. Let's get in there. What is it? Whoa. What does it represent? Here we go. There. So the kids here are representing it? This represents membership in society of watching and dying. And this is like member number. That's her logo. Very locality. Do you get it? That's how you do it. That's how you do it. That's how you do it. It's just getting out right now. And then we carry the things around. Because you got your plate? You got it somewhere. Yeah. Yeah, at home. It's actually carrying all my stuff. We don't have a team here. No, we don't. OK. We carry it around probably because it's hateful. And because we know we don't want to. In fact, we certainly can't carry it. We take your plates around and let it disintegrate. So it's a little bit of a force of the juice of blockchain or something like that. So I'll read it. Membership. It's a plate. Thank you. This closing session of the inaugural MIT computational law course. I'm going to go back to order. Or to order. I just wanted to do a quick round robin for any experts. We've done a little bit of this by way of like informal conversations. Projects or applications of the technology. Time. These cases. It's like some of the pie chains. One. Digital identity for disclosures might be another. Any thoughts about that? So we're. This is a reaction. Like I'm sure the driver used this kind of run list. And some of those are perfect. Maybe. Projects or carry forward or something like that. Those are just to explore. Whatever. We're going at the. Actually I'm supposed to announce this. Which is. We're going at the announced just today. Computational law and blockchain festival. They'll brought to you by legal hackers and a slate of other collaborators. Happening on March 16th, 17th and 18th. You can. I'll just show the. Show the site. Here we are. You can find out all about it. At. Legal hackers.org. Forward slash CLB. That's. Two zero money. We're going to have a meeting festival. 2018. But that stands for it. And it's about learning. Hacking and discussing. Just. Everybody. And. We'll have a new. Here. And we'll be some. See. You want to make a note of this form. To make one. We're willing to. So thank you. Hackers and all of our. All of our partners for that, including with that. What university group, aren't they great. So they've been very, very helpful. Play on this. A lot of diversity. Okay, so. So with that. I mean, I know you're. Right now. Or if you want to, if you want to. Okay. Okay. See how she'll do this. I want to make sure that your audience coming through. Check. One, two. Is your. My audio. Can you go on? Yes. Check. Check one, two. Check one, two. Okay. Or I'm going to you. If that's okay. Yeah. I'm trying to mute you. I think I can't. I'm sorry. Because I didn't start the session. Oops. Check one two. Or actually just do it. One, two, or actually, you can probably just drop off. Oh, good, you're muted. Great. OK, hey, Aura, you had a very interesting idea, I thought, about a possible use case. You want to, can you share it with us? And maybe just like in like a minute format. And then we'll go around the table. So in some religious communities, people keep on the type of requirements. So I'm just going to make it close. And the whole universe of cash, really, is the whole industry of keeping certifications of how cultured these are. It's not only based on press, right now. Certainly it is. They both don't know culture at all. This is the culture that's hanging on which rabbis are called. That's what it is all about. Sometimes it has to be about five or six months. And we have like the more broad ones called culture groups that we let our youth have a certain purpose and which we like. And it's very often that we press certain breads or culture, but then every lot, the rabbis have to comment on it in supervision and make sure that they love this portion. So for people that really think seriously, we need to keep cracking very hard with some kind of daily basis. So I was wondering maybe we could do some type of belching, ablication, or the whole supply chain. And using the examples that were discussed in the part, my thoughts right now are in the sense that someone still has to keep track of the whole legal who are the suppliers involved in certain projects and enough off-chain basis, perhaps. I don't know, like. And sometimes instead of off-chain suggests, is always like a blockchain maximalist view that everything's happening on the chain. I just say it would be like the chain is like off-world and actually everything's happening on the world and UPS and can have an AWS. So it depends on your perspective, but go on. So those are my thoughts right now. Okay, so yeah, blockchain for HLL and Identicon for Providence. Awesome. So I did look this up right now. So there's a little bit of coding, but it's not for culture sharing. I'll just say this is something called Blackhorn. Yeah, some people in the community, I'm involved in this discussion right now. And the whole trust base is right there, like why do people have such efforts to make kind of the industry go to this? And it's online, it's people just go off and send them back like this. Yeah. Okay, so. I think the foundation is valid. Arthur, let's go around, let's popcorn up just around the table. Some, just get the ideas out there, I'd say. I'll list them on the board, as we're talking to you. Any thoughts, David? Okay, thanks. I like the question, I think that's a really good application to see the supply chain. The supply chain is really interesting. And I also think it's interesting to consider from who talked about this, I don't know how you need to see this, but a records management perspective, authenticating records and tracking records to records requirements, whether you're a government agency or just another agency or any organization that wants to pass into a records program. So, okay, so can I riff off that a little bit? I'm listening about this actually. But before we go, thanks for your question. So pause, stop, stop. So kosher, co-kosher providence, that kind of capture what you're saying. Okay, and just so we can, so the problem then A, N, C, B. And then how would you say, David? Like records, records management, data governance, compliance, records and compliance, data compliance, any kind of a good apply, the federal government has certain records requirements. But I know that NGOs and other private organizations also have both of their own records programs as well. And I think to, I can see how the watching technology combination provides the type of, as we talked about at the first session, rather the type of technology we need to support that. Great, so I said records management, lots of governance to that kind of capture it. Great, thank you. So your second stick, give them on a similar line. So, if you have records, keep these for like health records, except for you having for individual soldiers in the field, then have every soldier on the ledger. I don't know exactly, I thought about that earlier, because this is another idea about, if you've been in a fire with the DNA sequence to your hash, then that's, that's you forever, right? Or you can see it applying to soldiers, or your soldiers' records, you can see it applying to just email records, to your part of NK, because you can read it everywhere. Pretty much, I'll make a comment. There's a lot to say on that one. Great, thank you for sharing it. And thoughts are right here. By the way, you're not limited to one, if you want to. You have a couple, and if you'd rather take a pass, apologize. Just want to harvest a little bit. The only thing that I'll bring up is, there have to be a way for the user, or the person who bought the fruit to verify that, that, you know, STAM or label or whatever is in the mix to the product, did come from, and easily verified way, because you might not have access to the same college because you've researched where it came from. I mean, the first thing I think of is probably a path of some scores, you like the idea. Yeah. So we'll just kind of make a quick notice we go. One of the big, and then we'll come back to this in a while, for each of these, and this is basically the input, so we're going to have to close out, verify ability challenge, which is so, because it's easy to come up with labels that can, partially, any spack pattern you want to lie about. So verify ability back to become something that you prove in fact is easy to get into. I just think it'd be really important for food because you're going to eat it in the next few minutes, and it's not like a huge shift of bullets that you don't have to, there's so many different challenges. Let's keep going. Maybe, I'm not sure. So we have a lot to say about it, like you get all the ideas down first, and then it was dig in. That's also a possible stop. It's just to piggyback on the verification. What we're kind of talking about really is a certification of kosher or certification organic, for example, as an example of what needs to be, certified by the government. So, really the records that needs to be, that needs to be verifiable are the inspections. Yeah. So what I'm doing here, and it's probably what I was thinking that bring up with others didn't want to discuss the things, is a generalizability that there's a food inspection. There's actually a lot of work in blockchain, and from the QRR code and a whole bunch of other folks, food safety and all that kind of line. But let me ask you before I let you go, because I know it's tempting to let back on ideas that have happened, but have you had any other ideas about maybe this technology could be used for this, or that in addition to records management or food to blockchain? And that's where, and that's the question right now is like, we bubble up some ideas. And I'm going to go a little bit out of order just to get more of the board that I know right here. And then we can go out of order, going out of circles probably the worst way to ask those questions, I apologize. But could you just say again, certainly from the board, the cool idea you had last night about the PNA? Right, so if you get yourself sequenced, right, then you assign your hash to that sequence or you'll be able to verify that that is my sequence. There's other ways to do the idea too, like I know that this scheme, I'll never use this like that, but yeah. So if I were to say like, what about something with the use of DNA in the data and the hash of that as a verifiable identifier? Right. That's very interesting. So there's like, it's like 80 gigs for your sequence that very, very complex thing. So it's not that bad, right? That's something that we could have actually verified very quickly on that network, but not on every response basis, right? Okay, that's a good one. What are the things, Timmy? Mine is a lot more simpler, I guess. I wonder like, how can we tie the identity of like a vendor to their, whatever I can try, they use on a blockchain when a good actually transfers hands. So like, they're using the identity cons to kind of track the supply chain with good, but then how do you usually, that actually makes it to the end consumer of what's at the end of the issue? Like what happened with David? He sent someone money, right? On Ethereum and the guy just never sent the good. And there's no way for him to actually, your request for that action because, like, yeah. I can look at Block Explorer and show, I sent this person something, that doesn't really, you know, I audited it, you know it, but that's not. Yeah, it'll do you any good, yeah. So like, how would we be able to do this? Yeah. Like the first few years you said, was great, and then, tying the vendor identity to transaction ID. To a transaction, but not just a transaction of a spend on a blockchain, to like a, the relevant tracks, all the relevant trade actual. Anyone can help me with this? I don't know. I'd like something to be asked, perhaps. For frauds and debaters, grab it at home. I mean, just with the way it encapsulates the core thing in the form of like the four words. I'm just gonna go for it, if Dylan helps me now. Okay, so who's that one? So maybe we can help you as we go. Okay, all right, I'm gonna say, okay, let me just see if I can reply to that a little bit. So do you need TMA? Is there a way to, because you used the example of David's unsuccessful trade, I mean, we're basically a group that he's had money, but he didn't receive the goods, nor was there any evidence that he didn't receive the goods. So could it be tying, sort of like, I'm just gonna say evidence, that means efficient evidence of key transaction events to, and identity together. Yeah, proven events or something like that. It's much like Donald Tracker, that we were just gonna- Right, yes. So it's a little bit like key life cycle events. Key life cycle, verifiable key life cycle transaction events or like that. Okay, last one. Miles, like the milestone would be, okay. So it's like create. Transaction milestones. There are a lot of key, you started me? I said, yeah, that's a little bit different. Yeah, that's a little bit different. Key events, those KPIs, they're also similar a bit broader, but they could be, anyway, key, so I'm gonna go a bit more on key life cycle, because that fits down to life cycle, transaction events. Luckily, this is on, it's being recorded, so we go back and unpack what that means, but that's good and we'll come back to it later, but something that Brian and I will probably, I'll talk about is like, maybe a hack, actually I'll put one up right here, which is part of this, which is a hack to incorporate FedEx and UPS API to the, what was it, the NorthSport, to the tonsil orders blockchain. Yeah, that's an oracle. Yeah, so it'd be like, so I guess the project that I have like, a possible application that would create, that would successful, create verifiable evidence of key life cycle events and transaction, would be, would be like, extend in Oracle, Oracle, O, R, A, C, L, E, two, one is gonna be UPS and FedEx, and then two, I'm gonna say get the hub API, just because that's an easy place to sandbox stuff, so if you change the file, someone makes a commit that's available in API, that can trigger something, like the code was deposited, something happened, it can stand for a lot. UPS and FedEx have a few things, like which were shipped, they've made it past a certain point, they will receive signatures there, so you can do quite a few interesting things to begin to get at exactly the agency space, okay. Good one, thank you, Tianan. Four ideas, go on. So two, the first one I think is the future of the application of one part of it should become a February 3, let's see, of blockchain contracts, so that I think that one of the things that I see about, and it's like a contract, a smart contract is same thing as a contract, and it's based on certain primitive that have to be a kind of a specification of the code, and that right now as coders, we are the gods in our world, and we can code whatever we want, without taking care of the law, but if we had a number of specification that we can follow in order to say, my code is compliant to the legal system, then that's an advantage and something that is if you seek to make the blockchain accepted in the wild world, so for example, a buying sale, like if there was within a product a buying sale, then instead of having the transaction having to happen, or the transfer of funds having to happen first, they should be like another commitment that when you receive the, when you scan the product that you receive, they put the money from your wallet is going to be adapted for certain amount, and that's how the transactions are happening, and it should be legally described as, this is function one, this is function two, this is function three, these are the payers, whereas we did the actors, and I was hoping that today we could actually have done the actors. Let's put it on Cambridge, so we can't get fired. But I think that that's actually be like a great tool for co-authors and to help you as they come forward, three, four, five words. So the specification for smart contract. Oh, legal specification? Legal specification for smart contract. Really good one. Yeah, so this is great, thanks. And so that you began like kind of, and then I just want to make one thing also like, great, you got the video on the, you developed the technology of something that I heard, like one of the key idea to identity is that you only have one identity on the blockchain. It is a universal transparent blockchain in which you only would have one identity. And one of the reason that we might see some of the technologies get so much funding in ICOs, it is most of the time, which companies actually can create the standard that is going to use across the world, like all the others of the other companies. And since it's a contract, it's going to use much more often than just a transaction. Anyone, numbers of companies can be simply a transaction that the person who wrote the first contract that's going to be the most used is going to get rewarded every time that contract is used. And therefore make on that. It's an incentive structure for the same industry. Yes, I think that that's, I kind of thought. That's great. I was just talking about how major incentive pizza is set back up on some of the best innovations come remarkably, you know, I was like the blue in the space, but incentive, incentive structure for what like legal innovation or for, just in general. In general, I think like kind of an incentive structure that is going to form a certain behavior, right? Or especially for innovation and propagating it. So when a lot of people use your innovation, so I'm going to see for innovation, propagation. Oh, no, no. For innovation. For innovation. Okay, here we go. Innovation like usage. For participation or for engagement. Engagement. For engagement. So, yeah. Okay. Innovation. What else? Any other ideas or thoughts? The group, darling. Thank you. Anybody? Anything? So I like the energy stuff, but so one idea we're going to do our business is, as I was talking about the World Check. So we have a centralized group that is looking for a non-consensus public records to say this person committed a financial crime or this person was acquitted and so on. You can distribute that instead. So instead of paying all these people to find enough evidence to say you're on or off this pleasure of criminals, we could just distribute the gathering of that information. And if there's not consensus by all of the people who are rewarded for adding records to the blockchain, then we want to get sufficient agreement that someone's always acquitted that you're off or convicted you're on. So there's two kind of things about, so for the thing that we've been innovating is the list of what kind of law and criminal is listed again? Well, financial criminals. Financial criminals on what was it called for your list? It's called World Check. World Check, okay. So on World Check. So could there be distributed, like plus crowd-sourced method or two sort of things, number one, almost investigative, like when people discover things, could they offer them? And number two, the main thing is fact check and have consensus on whether the person belongs on a list or not. Like is somebody committed a sponge or did they quit it? Was it whatever? Right. So it's basically consensus about does the public record indicate this or not? Consensus on basically World Check, like status, yeah, okay. Like a decentralized background check, where you can have different sources providing inputs. Decent. Yeah, I guess it's like a background check, sure. Yep. Have I said crowd-sourced for that meeting? Yeah. Because crowd-sourced lets us avoid this sort of conundrum, decentralized and distributed and so on and so forth. Okay. That's a good hack that we should talk, we need to keep that alive and talk about that. And that'll be useful too, especially when you have innocent parties that are not on there and you're doing their World Check as a service, but it's hard to lose the whole thing. So this is good, the idea being we get off of the list when a lot of people are aware that you shouldn't be on it, but it's hard to step to the level, because it's very interesting. Any other thoughts you have? Well, I really like the energy soft part, so. What do you like about it? I feel like I will come in on it. It's, well, I mean, I think all of the versions of it work pretty well explained. You know, public goods, distribution, the ability for people to write their own contracts, but other than participating in this system, it's all pretty fascinating. And the fact that it's a blockchain, it seems like you could really manage a lot of this stuff. So it's almost like let's just do it. I agree, I think we can do it. Michael's a terrific partner, he's got a live idea and a kind of scheme in places to drive things. Like energy systems automation, of the legal governance functions. That is like most people here don't claim to be legal. Beagle sort, there's like, there's an open space there in that project. So thanks for kind of like, clarifying that it's during the wrap-off, but I think it would have been a complete list without that. Okay, any other thoughts? It's probably out there. Along same lines of a growth check status list. What about the scaling it down to the medical record of an individual where that patient may have seen multiple doctors at from various hospitals. And there's a need for all the caregivers or any physicians to have disability of the treatments that this one patients have. So is there any way to verify the individual treatments for that patient? And it has the record on watching. Well, you want to house it so that the government center, right? Yeah. The goal is to ensure that all the doctors that are treating this patient have the same visibility of the treatment that's been done by the various doctors to ensure that there's no... I work for a disaster company. So what are the goals of starting this project? I think it's kind of like, let's say that you've had ideas launched into full-on discussions, which if we could do 10, I don't know if there's a plane, but you ask him, can we do five, can we get you five minutes of open discussion? That's okay. We just sort of surfacing these as good, but let me do a quick time check if you need to wrap right now or how many minutes of discussion and assume you'll take five minutes to get yourself in the back, you know? We have 10 minutes before we have... Okay, how about five minutes of discussion and then a hard wrap and then five minutes of one? Five minutes. Seven? Who's the timekeeper? I'll keep time. Thank you, Timmy. All right, Ilan, I'm sorry to interrupt you. No, it's okay, I'm saying one of the issues that was, you know, that's always really interesting about the medical records because, like, so I was working on the start-up that was doing that, that we have through blockchain and one of the biggest hurdle is getting all the players to buy in and so the proposition, and that's why you see, you know, it's like a banking system, is there going to be a consortium of the payment of the players in the healthcare industry to actually enable this to happen? It could happen anytime that they just don't want it. That's interesting that you said that because the Department of Defense and them, the players, has a project I'm going right now towards actually sharing health records of the attires are related to an activity when you hear the soldiers from these military members, but the way that it happens, the Congress has the law required it because they couldn't get set by them. So from the law then, the two departments had to cooperate and talk to each other and come up with an evidence to make it happen. Do you remember if we wanted to learn more about that, what we looked for? Can Google, VA, DOD, medical health records come up as well as the laws on the top? That's good. I just want to, that's exactly what I was looking for. May I ask? I was just going to also say on the energy blockchain and the researching, it appears that Australia has sponsored a similar project already using blockchain and the energy sector. Fascinating. Okay, I did not know that. Perhaps Michael does. We should ask him about that because if it's happening, then we should find out how they manage the legal aspects and maybe get some ideas. On common law nation as well, English-speaking. Also, they need to get one Australia standard. It's another website. What, you almost talked about the standard. Yeah. We also have the... So on the, I guess the final thing on the medical thing, before we lose it, is a blue button. You know, blue button? Is there anyone, blue button? Okay, blue button is a triumph of the United States, I think. And it should be a model for the world and for every other sector outside of the military. But when you leave the military, when you leave military service in the United States, since it was early in the Obama administration, during that time, I was mentioning of open data and data export and liberation standards. And NOVEC was involved in others. And you can now hit something called the blue button and it goes through all the medical records across all the different bases and your kind of positions and agencies and everything else. And it puts it into a standard big file and it will export to you. And you can kind of say a little bit, I think, about routing sort of like onto the desktop or will it like, you know, put it somewhere where I can download it with the link and there's a little bit of that there. That is awesome. So at least at some point, you can get the whole thing and then take it from there. It doesn't quite answer the question that you're getting at, which is an ongoing medical record and personal health record, online coordinated access control and updating and all of that stuff, which is obviously a very, very big issue. And that's not your challenge on a daily basis. The health of a patient for the first time, the patient being involved, they don't have immediate access to the records and the patient's not going to be able to. And oftentimes provides them a certain data provider needs. Just so, yeah. So there is actually something in the Media Lab called HealthRec, is it? Or MedRec, which is a very successful project that was done partly in the digital currency initiative by a Media Lab student to basically hash certain aspects of the records in a standard way and make an entry on a blockchain, at least to get the progress part and it did a few other things. So if you search MedRec, you can see any innovative solution that was done. I think, I can't remember who it is, like whoever the main medical record health coordinator is in HHS, it was presented to them and in some thing and they got some pretty good feedback and I worked on it in a hackathon and not in Nashville in time. And it's interesting. So one of the problems you get when you try to have medical records that are in authoritative places, especially if they're something where that you think they were attached to the person and that we'd have them in a drop box and a thumb drive is that practitioners for lots of reasons, clinical reasons and liability reasons are very reluctant to rely upon the records coming from a patient which would be the natural network centroid for all the records because are they accurate or are they up to date? Are they true or are they been hacked? All sorts of things. Like do they want to not have people think they're that fat or whatever it is? Like all these things that people do and all the things that happen in reality. Who's left holding the bag? What does it mean for your malpractice premium when you're doing this and for standards of care? So this med rec thing, among other things from a legal perspective maybe this component, thank you, of having a hash of the records from the clinician and from the source of the clinician so some identity stuff getting to what you were saying in conversation. You apply it to like, this is the clinician, this is the record, this is the date that we got and you get a kitty cat on there or an identity card or something. Now you collect these things in a personal health record. Perhaps then we could move the centroid for individual health records to the person themselves but also have faith in the accuracy and the up-to-dateness and the source of those records potentially, but I think there's a lot more work to be done on that one. God's on the board. So it looks like it's not done but unfortunately I think we've come to the point where the computational workforce is over and so I wanted to thank everybody for bringing, I really feel like everyone brought our A game to this and I consider it a very good start for which I'm grateful and I'd like to invite everybody to remain in contact through Telegram but also just through normal channels of your email and our web. We do a lot of things online with Hangout. I know it's somewhere like outside of your skiff and then we can do Hangouts or out of your lives that is always good. And also you're certainly welcome back, welcome back to the Media Lab so those of you who are local and those of you who have come from further away. You know let's consider this a very good start and I hope to see everybody in one way or another at the Computational Law and Blockchain Festival. Whether you're discussing things, hacking things or learning or perhaps teaching. So with that, thank you very much and let us consider this first class adjourned. Thanks.