 I'm Julian Gordon, I'm the Vice President of Asia-Pacific for the Hyperledia Foundation and I'm delighted to be here for the Hyperledia member in-depth webinar with our wonderful member GSBN on their next generation blockchain consortium combining enterprise blockchain with confidential computing. Before we dive into today's presentation, some quick housekeeping items. As this is a Linux Foundation meeting, I need to mention that participants must comply with our antitrust policy, which you can access and see on our website. Also, as we go along, please feel free to ask questions in the Q&A button below. We'll have Q&A after the presentation. Hyperledia Executive Director Daniela Barbosa was hoping to join us, but she's at the World Economic Forum in Davos and has been pulled into meetings. So Daniela has prepared some thoughts for us, which I'm going to share with everyone now. Greetings from Davos, Switzerland, where this week the World Economic Forum is having their annual event, where one of the themes is cooperation in a fragmented world. Removing trade barriers and empowering businesses to trade more easily by cutting red tape and emphasizing digitalization is one of the WEF's key themes, and I'm looking forward to engaging with global leaders on this topic while I'm here in Davos. My name is Daniela Barbosa and I'm the Executive Director of the Hyperledia Foundation. Our own Hyperledia community has been working on trade finance blockchain-based solutions for over seven years, with many lessons learned and earned. Many of these lessons, both on the business and technical side, are being applied to exciting new production implementations of trade networks that you will learn today during this webinar. These next-generation networks combine blockchain technology with other emerging technologies such as confidential computing and leverage state-of-the-art advancements in these disciplines. Across the Linux Foundation, digital trust projects like the Hyperledia Foundation, which is focused on blockchain and blockchain-related projects, and the Confidential Computing Foundation, which is focused on trusted execution environments, technologies and standards, are helping these next generation of trade consortiums. Today you will hear from two of our Linux Foundation projects, the Hyperledia Foundation and the Confidential Computing Foundation, as well as from one of these newer platforms brought to market by Global Shipping Business Network, or GSBN, to facilitate data exchange while maintaining the integrity, privacy, security and auditability of the data, a critical path to enable cooperation in this fragmented world. I want to thank GSBN's CTO Edmund Toe for GSBN's support of the Hyperledia Foundation and for joining Hart Montgomery, our Hyperledia CTO, and Dan Middleton, Principal Engineer for Confidential Computing at Intel, who will be speaking on today's webinar. I hope you enjoy the webinar and I look forward to discussing this and other topics with you in the future. Julian Newt. And so thank you, Daniela, for that great presentation from Davos. So I'm going to go out with much further ado straight into the presentations. So first I'm going to hand you over to our wonderful CTO at the Hyperledia Foundation, Hart. So Hart, can you take it from here, please? Certainly. Thanks a lot, Julian. Can you hear me? We can hear you. Great. So are my slides visible? Yes. Wonderful. Hi, everyone. I'm Hart. And today I'm going to be briefly introducing the Hyperledia Foundation. As Julian and Daniela alluded, I am the Hyperledia Foundation CTO. And my background is in blockchain and cryptography research. So before I really get into the Hyperledia Foundation, I want to mention some general background about the Linux Foundation, which, as everyone alluded earlier, contains both the Confidential Computing Consortium and Hyperledia. So the Linux Foundation's goal is to help and shepherd open development across all of software. And one of my favorite things about the Linux Foundation is that it is present in a lot of different areas and has a ton of different projects, many of which, you know, most people don't probably realize. So things like, you know, Kubernetes, LF Energy, LF Edge, Automotive Grade Linux, all of these things are actually Linux Foundation projects. And most people associate the Linux Foundation with just the Linux kernel. But there are probably several other software projects that you use every day in the Linux Foundation without even realizing it. And just some numbers here. It's an astronomical effort with a huge amount of developers and projects. It's a crucial part of modern technology and open source software. So what is the Hyperledia Foundation and where does it sit in all of this? Well, we like to think of it as a global cross-industry consortium of communities collaborating and advancing blockchain technology and distributed ledger technology. So what makes it special? Well, Hyperledia is an open source, not for profit, accelerating blockchain. But why do people like Hyperledia? Why do people use Hyperledia? It's hosted by the LF, as I've implied. It's neutral and collaborative, so it's open to anyone who wants to participate. You know, it's immune to the commercial interests of any single company and it's industry standard blockchains by business with an enterprise focus. So some background. The Hyperledia Foundation builds blockchain software, not blockchains. So we provide a community for open development around blockchain. We do not run blockchains as part of Hyperledia. We don't run tokens or anything like that. And, you know, actual blockchains implementations are out of scope of the Hyperledia Foundation. We have a global team of developers and we're always transparent as possible. There's no pay to play for technical participation in Hyperledia. And here are just some numbers on Hyperledia. As you can see, these are from last year. I don't have the up to date numbers for this year, but we have quite a few contributions and quite a few companies contributing to Hyperledia. Another slide on briefly on momentum. I don't think I need to go through everything here, but you can take a quick glance to see how, you know, how many people are involved in the broader Hyperledia community. So one thing I want to mention and go over today is what's the core of blockchain? Well, the core of blockchain is decentralized trust. And, you know, Edmund is I'm sure will certainly get into this in his portion of the talk later today, but we can think of a database or blockchain as a store of records. And the fundamental question is who gets to decide what records belong in the database? If one person or one entity decides it's centralized and there's sort of many different people or companies or whoever decides, then it's decentralized. And this is sort of a continuum, not, you know, a simple yes or no. And for the technical people in the audience, the consensus algorithm is probably the most impactful design choice. And if you look at blockchains, right, you know, you can sort of go from, you know, the most decentralized to the least decentralized on a continuum. But as you become more decentralized, you pay a price for performance. And that's why things like, you know, Bitcoin and Ethereum, you know, at least if you use the L1s today, are not scalable enough for many business applications. So why do we care about decentralized trust? Well, suppose we have several entities that need to agree on some data, but no one trusts any other single entity to be the source of truth or a store of information needs to be made redundant in the case of compromise or attacked by a hacker. Or what if the entity that would be the best official, you know, source of truth for some data doesn't want to or cannot be responsible for the upkeep of the data or people responsible for maintaining a data set or dynamic and changing quickly. So one thing to think about, and I think is a critical point about blockchain, is, you know, if you're asking, do I need a distributed ledger or a blockchain? It's really just, do I need a database with decentralized trust? And when you're talking about an application like GSBN, you know, this is where it's really important to have decentralized trust. And this is why blockchain is such a great solution for this kind of problem. So, you know, today, we sort of conflate blockchain and distributed ledger as terms. And so I want to make sure that everyone's clear on this. So technically speaking, a blockchain is an appended only system of record and a distributed ledger is a distributed database with decentralized trust. These terms are mostly used interchangeably. And if we think about popular blockchain systems, right, you know, you can sort of think of Bitcoin as a distributed database for some some sort of money with decentralized trust. And Ethereum could be a distributed database with, you know, decentralized trust for computer programs, which, you know, a smart contract is really just a computer program. And fabric, for instance, you know, at least in theory, has slightly more centralized trust than Ethereum, but it's still quite decentralized and it says much, much more performance. So, you know, this is sort of what you want to remember when you're thinking about, do I need a blockchain? You want to think about, you know, what's the information being stored and why is having one centralized entity maintain this information? A bad idea are generally infeasible. And as you're thinking about, you know, applications like the GSBN, you know, this is really good to consider. And you can see why blockchain is really useful and is being used in business and why it's just not sort of a hype technology. And, you know, people ask, well, where can we use this decentralized trust? And it's really all over the place. You know, I've just listed some of the applications that are here that we see people use hyperledger technology for. And, you know, it's it's not, you know, it's not small companies. We have lots of big companies and big enterprises, you know, realizing that they need decentralized trust and hyperledger technologies are the way to achieve this. So here's sort of the the technologies used by the top 100 institutions. Fabric is popular. We note that for Ethereum, a lot of people in this list are actually using hyperledger Basu and there are other technologies as well. So just briefly going over some of the most popular applications for blockchain. So payments and trade finance is one of our biggest application areas. And obviously, the GSBN is a great example of this. So, you know, I'll defer this to later in this presentation because you're going to hear a lot about this today. CBDCs and finance, here's a diagram of where people are currently experimenting with hyperledger technologies for CBDCs. And you can see it's really all over the place. I'll point out that we have a whole ebook on CBDCs and finance if you're interested in this application as well. And prominence is supply chain, also another application where decentralized trust and hyperledger are extremely useful. So companies like Circular, Walmart, Tencent, Track and Trace is very important and is a big application of blockchain. And finally, digital identity. I don't know how many people here are familiar with digital identity or the core concepts, but self sovereign identity is an extremely powerful technology and identity is going to underpin pretty much everything in Web 3. So we're excited to see that take off. So, you know, all of these applications are really driving, you know, a ton of new development priorities. And, you know, now in today's hyperledger, we're really seeing an effort to address modularity, interoperability, privacy, performance. So really things that, you know, involve working together in a global network of communities, of blockchains, of people and really focusing on this, you know, sort of world of many networks. So to address this, you know, we have a bunch of 14 currently different hyperledger projects and I'll explain some of them briefly. We obviously have some core distributed ledgers and these tend to be our older projects. Many of you are familiar with fabric or Beisou, but we also have Indy Eroha in Sawtooth and which Dan was a founding contributor of Sawtooth actually back in the day. And we also have some tools and these really start to address our interoperability and modularity and the new focus that we're seeing on this sort of world of many networks. And Bevel is a tool for blockchain automation. So it's designed to help you run blockchains more easily. Cactus, now recently renamed Cacti, is a tool that enables blockchain interoperability and integration and Firefly I like to think of as sort of a blockchain container, which means that you can write code once and you can run it on a lot of different blockchains that Firefly supports. And finally, we have some libraries. For instance, Aries is an extremely popular library focused on identity. So, you know, that's about all that I have time for in today's presentation. So I believe we're taking questions at the end. So thank you all for your time and I will be happy to answer any questions you may have. And if you don't get a chance to ask today, happy to answer questions online via email or Discord, or however you can contact me. So thanks a lot. Thank you, Hart. That's great. And please, everyone, there is a Q&A button, so please put questions there and we will be answering those as we go along. I'm now going to hand over to Dan who, as was suggested, has a long history also with Hyperledger, but is the principal engineer with the Confidential Computing Consortium. So I'm now going to hand it over to you, Dan. Thanks, Julianne. Are you able to see my slides? OK. You can see them and we can hear you. Wonderful. All right. Well, thanks again for the invitation to be here. As you mentioned, I have some time with the Hyperledger going back to its inception and really enjoyed learning a lot about open source through my participation in Hyperledger. And I think it's a great way for any of you out there to get deeper in technology and broader in the ecosystem. I now spend most of my time focused on the Confidential Computing Consortium, where I have a similar role recently, chairing the Technical Advisory Council there. The CCC, we start our meetings a lot like the Hyperledger Foundation does, which is we point out that we are an open collaborative community and everybody is welcome, all are welcome to come and participate with us in any of the public venues that we have for the CCC. We like mentioning that even before we mentioned what it is we do. So we're a little younger than Hyperledger. We were officially announced in the end of 2019. So pragmatically, we really started off in 2020. And the goal of that was. To accelerate the adoption of this thing that we've been talking about, Confidential Computing, so we should probably talk about what that is. Normally, if you have some secret information and you want to protect that when you have that data at rest, like when you've written it to disk, you probably use something like disk encryption. If you're going to go send it to another computer, you're going to use a protected mode of communication, maybe something like TLS. But until the last few years, there hasn't been a real practical or scalable way to actually protect those secrets when you go to use them. So when you're actually working with the secret information, that's when it's sort of most vulnerable and it is exposed to any malware that might be on that host that you're working in. And so these confidential computing technologies are a way to actually protect that so you don't expose that even during the execution. We worked towards a very precise one-sentence definition of what this should entail. And so the focus is that you see there are that it is protecting the data while it's in use. It's not just software mechanisms. It will include some software mechanisms, but it's got to be hardware-based because that adds another layer of security to how you protect the information. And then very recently, we felt that we needed to add the word attested into that definition. And if you have not been exposed to attestation before, this is the mechanism of providing evidence so you know that you can trust that platform is actually protecting the data that you're going to send it. So you can learn more about that definition through a lot of the materials that we make available on our website. We've got three different interest levels or interest perspectives that are covered by white papers that we've already generated. So if you've really come into this more from a business perspective and you want to know, like, is there actually a big enough market of this kind of technology that it's safe for me to build on it? We have third-party market research, which is the top paper that you see there. If you really want to dig more into the technical details of what do we mean by a trusted execution environment? The technical analysis. I think you're still showing the first slide. Oh, that is unfortunate. Let me stop sharing and reshare. You know, if it has refreshed for you. I think that's a refresh. Do you want to try going forward a slide? Okay, is it working? Okay, so I'm going to take it out of slide show mode. And we'll just try sharing again here. If that doesn't work, we can show the slides for you. You are now, you're on slide four, five. We can see it. Great. Yes, excellent. Thank you. All right, so we'll pick up where we left off there. There's three different articles that we've, three different white papers that we've created. And you can get to all of those through the website. Since you're here today, I don't want to talk exclusively about stuff that's already out there. So we've got a couple of things that, that are not announced that we will get into. We're laid out a lot like Hyperledger. And if you don't know how Hyperledger is laid out as an open source organization, that's not a problem. But it all sort of starts with the, the member companies. When we started in 2020, you'll note that there's a lot of big name tech companies that were already deep into the technology. And I wanted to work together to promote the adoption of this new mechanism for security. As we headed into 2021, we started seeing more adopters get engaged. I like Eric's article here because he talks about it from the perspective both of being an adopter of the technology and also as a technology provider. And I thought that was a nice intersection of the growth that we saw heading into 2021 with more and more companies participating. As we exited 2022, probably the most growth that you see there is that general members area kind of got denser because we've got about a third more members there. And to me that reflects the amount of innovation that's available at the software level. So a lot of what we do with confidential computing are fundamental building blocks that are at the hardware. But whenever we add some new building block at the hardware, that really creates like a combinatoric effect that the software that you can build with that is really much more prolific. So much like Hyperledger, what we try to do is facilitates the development of technology, development of papers to make it easier for end users to adopt. And we accomplished quite a bit over the last year one of the things that is not officially out yet but we already have drafted is this sort of year in review for 2022. So that is not on the website today but I'm guessing within the next couple of weeks you will see an article out there that covers all of these points. I'm just gonna point out a couple of things. One is the importance again of adding attestation to our definition. And we did some increased work in a special interest group that I'll talk about in a couple of slides. And because this information is new to a lot of folks all of our technical committee, our technical council meetings, we try to include Tech Talk and we include organizations from outside confidential computing that are adjacent to us as well. So multi-party computing, homomorphic encryption, these are all topics that we'll cover in the meetings. I think educational regardless of what level you're at with the technology. And then the last thing is we had Hyperledger's own Tracy Kurt, chair of your technical committee, come talk to us about developing communities because once again, diversity, stability and inclusion is important to us at the CCC as well. So one other unannounced thing that you get to learn about today is the latest white paper that we will be posting on our website is about terminology. As you go to deploy confidential computing, that can take the form of a library, it can take the form of an application, a container, an entire virtual machine. And being precise about security is important so that you are applying it in a way that actually gives you the protections that you're looking for. So we have a fairly detailed diagram here that shows a lot of the different ways that you could embody confidential computing along with textual descriptions that help inform your selection or how you choose to go about deploying that software. The document itself is not officially published that will probably be up within a week or two but because we are an open source organization all of this is developed in the public. And if you go out to our GitHub at the URL that I have at the bottom of the slide you can actually read that document today in its markdown form rendered on GitHub. So we would not be here of course without open source software. So we've got seven projects right now at the CCC. And these come primarily from a lot of those original technology companies that saw value in confidential computing but then also a few new entrants and a spin out from one of those companies. There's a lot of different ways that you can adopt this. If you wanna be as precise as possible with how you are building the security envelope around your software or your secrets you can work down at the API level and that's what you get with the open enclave SDK. Most of the other projects here are about taking it up a level of abstraction. If you have a pre-existing application and you want to containerize it Grammy and Oakland have ways to build a containerized version that will launch that container in a trusted execution environment. And if your interest is more in web assembly NRX is a very interesting project that's spun out from our friends at Red Hat. Verizon is the newest project in the CCC and that provides building blocks to work with Adastation. And Adastation is such an important topic that it has its own special interest group for us. We also have a special interest group for the operational considerations of confidential computing. You might have compliance obligations that come from regulatory frameworks and we have, particularly for those of you that are joining us from a financial services perspective participation in the CIG might be really valuable to you. Because I've mentioned Adastation at least three times now without giving you a really solid description of it other than that's the evidence that you use when you engage usually in a protocol so that you understand whether you can safely interact with that confidential computing environment. I wanted to point out that we have a ton of content. If you go to our CIG's GitHub that's listed there at the top of the slide, you will find a meetings repository that has recordings of talks on various standards like DICE protocol proposals like a tested TLS and at least three of the projects that I had listed on the previous slide use something called remote Adastation TLS. So this is a way to build directly into your TLS connection verification of evidence that the environment that you're running with has integrity. And because those all came from the same paper but not from the standard, they took slight variations in how they were implemented and a great outcome of this CIG was recognizing that there were just little differences and we could harmonize those. So our newest addition to the Adastation CIG is a sub-project to harmonize these remote Adastation TLS projects. The other CIG that I mentioned is about managing risk and compliance. One of the kinds of things that we're gonna start doing in that CIG is reaching out to these different organizations that you see listed on the slide, those and others and start to build in a recognition for the capabilities of confidential computing. And finally, we'll talk just real briefly here about what we do with outreach. One of the benefits of working together in open source in a consortium like this is that the sum is greater than the individual parts. And so we get together in a variety of ways with outreach whether it's webinars like the one that we're on here through Hyperledger or directly at conferences. And we have a pretty full conference schedule lined up for 2023. We get underway at Bosnum in a few weeks. And then in March, one of our biggest online presences is at OC three. So if you wanna take a look for OC three in March that's probably a very convenient way for most of you to learn the next level of the state of the art in confidential computing. And then in June for the first time we have an in-person conference in San Francisco. So you'll start seeing more online for the confidential computing summit in San Francisco. And that brings us to the end of the material for confidential computing. Thank you, Dan, that was great. And I'd like to reiterate what he said at the beginning. Everyone is welcome and diversity is important. It's kind of our strength here at Hyperledger. So I just wanna reinforce that. And thank you, Dan, that was great. And now I'm gonna hand over to Edmund from GSBN, the CTO of GSBN who's gonna go through who made this all possible today who's gonna go through the Global Shipping Business Network. Thank you, Julian. And I trust you can see my screen and also hear me okay. So thank you everyone for joining. My name is Edmund, the Chief Technology Officer of Global Shipping Business Network. Before we go through today's agenda I just want to say thank you once again for the support from Hyperledger and also a confidential computing consortium. So let's get started. So this is our agenda today. So first we want to share a little bit about the background of GSBN. Next we want to go into the technology platform of GSBN. Then we look into a number of use cases starting from the first one around cargo release which is a process in the supply chain followed by the electronic bill of letting solutions which is often the connection point between the two industry, the supply chain industry and the financial industry, the trade finance because EBL is a product which is related to also the letter of credit financing. And then to move on to share some of the other activities that we are doing related to trade finance space including how products on open account financings as well as shipping activity insights particular this one leveraging confidential computing as a technology complemented with blockchain. We'll have a demo at the end and let's get started. So about GSBN. So GSBN we set up as a independent entity in March 2021 which giving us roughly around two years of operating history. But actually the project date back in 2019. So when it first started some of the founding members which we see on the right hand side as well as our shareholders back in 2019 we signed the surface agreement for the resources commitment to obtain the necessary approval related to regulatory competition and I first order establishment of global shipping business network. If we are describing some of the founding members and shareholders on the right, we have three shipping lines. We have the shipping line from Germany. So Hapaloi, we have the shipping line from China Costco shipping, the shipping line that originated from Hong Kong OOCL. We have five of the global terminal operators. So Hedgeson Port, I've worked in Hong Kong the port group in Singapore. So PSA as well as the largest port in the world in terms of footprint, the port in Shanghai SIPG group as well as the Costco shipping port and the Chengdao Port. So with all these eight company, what does that mean? That actually account for over one-third of global container volumes. So it's very exciting from the beginning that we have this strong backing from the industry if we are looking into emerging technology like blockchain and confidential computing. What are some of these use cases that we can build on top? What can we bring to the industry? So to share some of the highlight of GSBN, so we are a trade data utility platform and we are also set up as a not-for-profit organization. I want to unpack a little bit why we have such decisions. We believe in order to bring changes to the industry, data is very important. And it is as important as water, like electricity, which are utility, which in many cases in the world, the organization that are providing those utility, that goal is not to maximize profit, but to provide this as a utility to the society. We are a data platform and also open to cause industry participation. On a technology fund, we are powered by blockchain technology, in particular using hyperledger fabric, which is built on trust, permission technology. One of the very interesting design of GSBN is that at GSBN, we do not have access of the data, which is very important to be the data exchange platform where we have different parties and it's on some occasions they could be compared to with each other. And for GSBN, for us, we don't have even for myself as a CTO, we don't have access to those data. As an independent not-for-profit consortium, we are here to choose fit for purpose technology. So currently we are building on a number of infrastructure, including Oracle, Microsoft, Alikow in China. While we can talk a lot about technology, we are also very use case-driven. So in today, we'll share more on some of these use cases and what are the impact that we can make to the industry. So we will move on to a quick summary of the technology platform of GSBN. So the mission of GSBN is to facilitate data exchange while maintaining the integrity, privacy and the security and the auditability of the data. And if we are going to break it down, we break it down into the three layers. So the first one, starting with a number of products and services which will go through that in the use case sections. In the bottom, we have a number of platform capability at the bottom, we have the foundational technology. So we talk about blockchain at GSBN, we are using hyperledger fabric in productions. And currently we are not putting sensitive data on the blockchain, I mainly use putting hashes of those transactions. So allowing different parties to verify the authenticity of those transactions. And we also have nodes deployed in a multiple jurisdiction. So we have some blockchain node deployed within China or outside China in other locations. Second point that we want to highlight is on encryptions. So the way the encryptions decide at GSBN is data is actually encrypted before sending to a GSBN platform. So at GSBN we don't have access to those data. And this is a technical reason why we see different parties, shipping line and terminals on how they can trust us. On top of these two foundational technology, we believe and we see confidential computing is also a very appropriate and uncomplementing technology on blockchain. So that as a result, we can ensure data is tamper proof. It's only shared with permission parties throughout the data lifecycle, meaning, you know, Everest in transit and also in use. And based on that, we have developed a numbers of platform capability on top, starting from the workflow APIs, which will share a little bit more particular, some of these related use cases or, you know, cargo release or electronic view of letting consents collections, which is a very important element in the data sharing, particular around the open account use cases on the trade finance identity management, as well as, you know, data kingdom related to confidential computing, which will have a quick demo on the shipping activity insight. So with that, yeah, let's go to the use cases. So the first use cases, which we want to share is on cargo release. Now, what does that mean? So typically when a cargo and container cargo, it is at a destination port, to release a cargo traditionally, it takes a good number of days and usually involve a lot of, you know, paper documents. And we see it's a scenario where they involve multiple parties and this party could be, you know, shipping lines, terminals, ship agents, et cetera. Where we see there are multiple parties which they need to agree on this on a single source of truth. And this single source of truth, you know, is the status of the container. This is a perfect use cases for technology like blockchain. So in our products, you know, we have with our blockchain solutions, we have digitizing the process, process between exchange of document, you know, shipping documents such as CWA build, Alex release, delivery of border, et cetera. And with our blockchain solutions, we are very pleased to see that we have shortened the process that usually take two to three days to one to two hours. So since our launch, we have rolled out to four different regions over 16 ports. So here we give a snapshot of our solutions that brought out globally, you know, strong footprint in Asia, in China, Singapore, Thailand, Rotterdam, which is a very, you know, important port in Europe and rolling out to, you know, Latin America such as Mexico. So our second use case is on electronic bill of letting solutions. To start the context, bill of letting is very important trade documents. So this is issued by the carriers to acknowledge the receive of the cargo from the shipper. And by using blockchain technology, the title owner and the document holder can both be recorded and logged on the blockchain. Assigned on the logistic fund, this is the document which is also important in the trade finance process. And in many of the lack of credit transactions, which is heavily used in bank, original bill of letting is also required. So this is a product that is, you know, not by building by GSBN, it's actually building by, you know, a company called IQX. Now what that means is at GSBN, we are very open to co-grace. So if you have, you know, future use cases, if there's any idea, speak to us, you know, we want to explore in the community. And since the launch of IQX EBL, you know, we are very pleased to see interested from banks and number of blockchain consortium as well. So below we are sharing some snapshots of the launch of the EBL event with Bank of China, our partnerships with another blockchain consortium contour. And on the right hand side, we're also sharing a lot of some of the things that we are also working on, particular, you know, expanding rather than just container shipping, we're moving into voucher paying, you know, working with PIMCO, as well as working with digital container shipping association DCSA and a number of other EBL solutions provider on the topic of interoperability. So from the trade finance side, we briefly touch on the letter of credit, but from Bank side, they are also, there's a very popular financing around open account. And what we see is shipping data is also essential for banks to validate the genuineness of shipment in trade finance approval and cross-border payment process. And for many years, you know, banks have been just relying on a paper-based, a BL because they have no means to verify those data. And hence, at GSBN, we have developed the consensus application, which established a channel to facilitate consensus-based secure data transfer between carrier and banks. You quickly walk you through the workflow. So, you know, starting from the below, banks can, you know, make such requests via GSBN and that will notify the beneficiary cargo owner to provide a consensus. They will send it to the carrier, carrier will review it and then they can share the data and for the banks to review it. So, this is making this app is make the whole data sharing possible. And on the, on the, on the right, we are also sharing some of the, you know, successful part of the transaction with HEPA Law and Bank of China on this initiative. And going into the last year's case, on top of, you know, validating the generous of the transaction, we see banks also need to conduct a credit assessment, as well as, you know, KYC in the facility setup stage. And we see shipping data when they're aggregated it a lot of value by providing insight to company's activities. So, we combine, you know, blockchain as a data exchange to, you know, confidential. We have, you know, securely processed those data where, you know, carriers do not need to disco more than necessary and banks also have a way to actually digest those data. So, quick illustration on how that fit into the pictures. You can imagine there's a set of shipping data that sit within the ERP system of the shipping lines with center blockchain, you know, allowing, you know, those to be, you know, exchanged it and also, you know, have a template proof record combining with, you know, our encryptions and also how that being analyzed in the data key room and we can get, we can get an aggregated insight. So, by combining, you know, blockchain and confidential computing technologies we can get data lifecycle with, you know, perfectly control of security and audio ability. So, we actually will look into a quick example of these use cases. So, to look to share, excited what we are going to demo. So, here, as we mentioned, when bank is structuring a trade they would like to have holistic view of, you know, customers, you know, business model of your ability and track record. Instead of looking at shipment one by one where banks needs to, banks can have now a statistic of key indicators such as, you know, distribution of goods, a range of decorated amount, et cetera. With confidential computing and what we see a data key room in the demo carriers can easily upload those relevant data and those, and we can also use that to perform certain computations in the demo. And to last, you know, in the demo we will also see multiple carrier can leverage the same data kingdom to enhance those representation of shipping insight. So, that's a lot from your talking. So, if you're interested, there's a blog there but I'll just quickly share the video of the case that we just spoke about. So, on the confidential computing side we're working with Decentric which is a member of the Confidential Computing Consortium. When we go into this user interface on the left-hand side we see the data key room in particular here, you know, looking into the shipping insight. After that we see that they are, let me pause a little bit. So, we see this two part here as we mentioned earlier, you know, recognize the data bot and the computation bot. And a data part, you know, we have, for example, three carriers uploading shipping related data into the data key room. You can imagine in more of a production system they are going to, you know, connect it, you know, via API and stuff. So, after they are being uploaded, you see that the data is actually being encrypted before we send to the key room. And, you know, all the different carriers will actually perform the similar exercise. So, after all the three carriers providing those data, you know, to our system and also with blockchain guaranteeing they are being tamper-proof, they, we will simulate the part where the bank, you know, can also upload and share, you know, what are the entities that they want to get information from. So, here, you know, the banks will say, you know, I want to get information related to this particular company's call for Adams, you know, with, you know, certain registration code. And after that is being done, we will go into the computation part. You know, just setting the context in practice is being performed by multiple companies. It's not by a single person, but this is like a quick demo so that we can all see how that looks in actions. So, in here, it performs certain set of computations, you know, starting from the top where certain SQL query to union the data with some, you know, Python script, you know, getting some insight. And at the end, if we perform the computation on the right, you know, we can generate a report for this particular company where if you open that up, this, you know, while shipping line, they don't disclose sensitive information to each other. We can, you know, draw very meaningful insights around, let's say, a company over a certain period, what are the, let's say, total number of BLs, which they had, what are some of these, you know, cargo quantity statistic, you know, followed by some of these, you know, declaration amount and followed by the bottom, you know, exactly what are some of the goods which they have shipped. And in my view, and when we engage with banks, you know, these are all variable data for banks to provide financing to their customer. So, that's a quick intro on GSBN. If you're interested in knowing more, yeah, we put out a hypereducate studies. So, a lot more details on some of the use cases. We'll also be in Longbridge, California, joining the TPM 23 and TPM Tech conference. Organized by the Journal of Commerce. So, yeah, if you are wrong, yeah, yeah, I'd love to meet with you in person. And lastly, yeah, thank you. So, if there's any further questions, yeah, feel free to, you know, send me an email, connect with LinkedIn. Yeah, thank you. So, back to you, Julien. Okay, thank you. Thank you, Edmund. That was, that was excellent, right? Pulled everything together, right? From the hyperledger, blockchain, the confidential computing are now actually in implementation at GSBN. So, now we have about five to seven minutes of Q&A. So, please, people do put your questions in. Now, let me see. I got to get, pull some of these up. So, I think one of the kind of questions we're getting is how does one get involved, right? How does one join, get involved in hyperledger, confidential computing, and also GSBN? So, maybe we'll start with Dan. Do you want to talk about how one can get involved, one join, get involved in the great work that the CCC is doing? Yeah, that's a great question. And it's one we get a lot, of course. So, you can go out to our website and you'll see all the projects there. One of the ways that I get engaged with open source is I go try to build something out of one of the projects. And that kind of gets my hands in. If you're more inclined to get involved through meetings, we meet as the technical counsel every other Thursday. So, we'll be meeting next Thursday, which is the 26th at 7 a.m. Pacific. And I can put the connection info into one of the chat answers over here on the platform. Okay, excellent. Do you want to talk about how you get involved in hyperledger? Absolutely, yeah. So, as Dan said earlier, the CCC and hyperledger are laid out in a fairly similar way. So, a lot of the ways that you might want to get involved in CCC are also ways that you might want to get involved in hyperledger. It's great looking around the Wiki to see sort of what projects you might be interested or what you want to work on. All of our projects have meetings. So, as Dan said, it's often a good idea to just show up at a meeting and start asking questions if you want to get involved. I will note that we also have a pretty extensive... We have a large number of special interest groups, which are typically focused on a particular application area. And if you're interested in a blockchain for a specific application, these special interest groups are often a great way to get involved. Okay, maybe let me share the part about GSPN. So, as an off-profit consortium, currently, I think that sort of depends on what sort of organizations that you're representing. So, while we are not for profit, we also have some sort of a membership structure that's similar to, say, hyperledger. So, if you are chipping line, if you are terminals, if you are banks, we have some membership for you to consider. But if you are not those banks, chipping line and terminals, as I mentioned earlier, we also work with different application builders to explore a range of use cases. So, if you want to get involved, let's speak, send me an email. I think that depends on use case to use case. You know, yeah, we can take from there. Thank you. My name has been involved. He started the hyperledger meet-up and he's very much involved in the community as well, right? So, very much contributing back. Thank you. Also, I think we should mention we have a special interest group for supply chain and trade finance. So, I think we have Andrea and Eric are probably listening to this, right? So, please do check that out as well. So, we have some specific questions here, which I have someone, Ayan, has asked, I'm not sure this is relevant. Edmund, what do you think of integrating GSBM with Swift infrastructure? So, what we see is, so we have conversation with Swift in short and what we see is Swift, you know, of course, a lot of them is providing a network, you know, original different banks and very often related to payment aspect. But we also see that Swift has certain initiatives with, you know, with related to a particular space related to trade. So, you know, I don't have anything note that I can announce perfectly yet, but we're definitely aware of, you know, you know, organizationized with, yeah. Thank you. And I see Thomas Klein also in the answers he's given the link. And we'll do this when we're at the YouTube. We'll give you a link to the supply chain and trade finance link. So, here's some specific questions for you here from Mitra. There is, in reference to cargo release use case, could we also capture info from those shipping docs and use them for invoice calculation and reconciliation? Yeah, so what I think, I see two questions. I also see sort of time of running out. Maybe I want to, you know, take it both. So, I see one about cargo release. Second one about, yeah, about trainings. So, maybe I share some of our view. So, particular of a cargo release, you know, what we see is, you know, we start with the process of certain supply chain. You know, so there are certain documents related to the release of the cargo, which is at the container port. But to share some, you know, background information, this is, I would say, where we start digitizing the process on the supply chain, because cargo release is a process that actually involve a lot of the terminal and the shipping line. And then GSBN, you know, we have a strong footprint and early adoptions because of our founding members in both the shipping line and terminals. So, this is where we start. It doesn't mean that we end here. And, you know, this is the process. You know, we look at the logistic style of things. We start with the cargo release process. You know, we can move on to warehouses, you know, we attach a folder, et cetera. So, on that front, what we see is the process of digitizing the trade finance and starting from the document or information capture in the cargo release process. And from that end, you know, we are re-extending. Yeah, second question. I saw some questions about, you know, tradeings and what we see at GSBN. So, first, yeah, we want to give a lot of credit to tradeings. Yeah, I think they have done a lot of, you know, good work. And GSBN, what we see, you know, at GSBN, the tradeings, the platform may not be operating, but we see, you know, digitization of shipping or global trade is here to stay. So, at GSBN, you know, in a certain area, we take it differently, you know, setting up as a not-for-profit, you know, consortium or the business end. From a technology, you know, rather than looking and solely focusing on just blockchain technology, we see how blockchain can, you know, complement with, you know, other types of technologies such as, you know, confidential computing, you know, other technology we're also looking into such as verifyable credentials, you know, decentralized identity, et cetera. And lastly, you know, yeah, we have strong focus on cooperation. You know, that's why we have the webinar today. You know, we, if you're interested, I see that a lot of questions. Thank you. I know that we are running out of time. You know, I would love to, you know, connect with, you know, all of you, you know, after this call. And, you know, we see cooperation is key. You know, we see at GSBN and it too. And if it's relevant from your organization, you know, also participate in hyperledger and confidential computing consultions, you know, event, join as member, et cetera. So yeah. Back to you, Julian. I think that's it. We're up to the hour, right? So you knew this is always going to be a challenge to get all this great information, and we've done it. So I would like to thank Dan, Hart and Edmund for your expertise and sharing today. I'd like to thank the audience for being here and listening. And I think this is just a part of a continuing conversation of having and what we're doing here at Hyperledger and the consortium, the confidential consortium. So thank you, everybody. Take care. We will put more information down on how you get joined, how you get contact at the bottom of this video if you're watching this on YouTube later. And really just thank you. Thank you again to the speakers today and thank you, everyone, for listening and collaborate. We look forward to it. Take care, everybody. Thank you. Bye-bye.