# 🌍 OAuth3, Mar 25th - AA the World - Interop the Worlds - Automate the World ## 🧭 Overview This document captures a freeform, high-context jam session exploring the future of identity, authentication, and programmable agency — through the lens of Oauth3, TEEs, and cross-platform coordination. Participants sharing live on what it means to “encumber an account,” enable zero-click login, and design composable apps and agents that move fluidly across the modern web. The discussion centered on two core tracks: - **"AA the World"** — grounding identity in secure, expressive delegation via Oauth3, context-aware login flows, and TEE-based enforcement. - **"Interop the Worlds"** — understanding how blockchains serve as *credible commitment devices* for programmable agents and user-owned identities in Web2+Web3 convergence. Themes include: - The tension between frictionless UX and privacy-preserving consent - How to frame Oauth3 as a standard for intelligent authorization, not just login - Why TEEs could justify zero-click flows without reintroducing surveillance - Where wallets, agents, and identity intersect - Why NFTs are better framed as context-aware access tokens - And how to build agentic interfaces that interact with legacy APIs and social platforms — without losing trust, context, or user control This isn’t a formal spec discussion — it’s a high-bandwidth space for convergence, jamming, and prototype visioning across identity, UX, and protocol layers. Think of it as a “roast + reimagine” of what access and identity should look like in the agent-powered internet. ## 🧠 Ideas That Emerged These are the key conceptual shifts and reframings that surfaced during the jam session: - **Oauth3 is not just login — it’s the gateway for programmable agents.** Instead of “log me in,” we’re moving toward: “authorize my agent to act with scoped policy.” - **TEEs justify “bad ideas” (like zero-click login) when trust enforcement is shifted to the enclave.** Privacy no longer requires friction if we trust the execution layer. - **Apps are agents. Tokens are access keys. Agents + NFTs + TEEs = programmable identity.** We’re redefining apps as policy-driven agents, and NFTs as intent-carrying access credentials. - **Wallets become intent routers, not just key holders.** The wallet is where delegation logic, consent policy, and execution control converge. - **Oauth3 as a programmable reverse proxy for humanintention.** It acts as a middle layer between users, agents, and APIs, enforcing programmable consent and composable actions. ## 🔑 Core Questions Emerging ### 1. What is a Login Today? - Not just authentication — it's **access negotiation**. - Oauth3 explores “zero-click” or **context-aware** login where apps infer consent. ### 2. Is Zero-Click Login a Good Idea? - Historically discouraged (privacy/tracking risks). - With **Trusted Execution Environments (TEEs)**, it may now be safe and usable. - It's not about clicks — it's about **trust, context, and user control**. ### 3. What is a Wallet? - More than key storage: - A **policy enforcer** - A **context-aware agent** - A programmable interface for delegated authority ### 4. Where Do Web2 and Web3 Intersect in Apps? - Web2 = closed APIs, wall gardens. - Web3 = **composable identity**, portable credentials, programmable permissions. - Goal: meaningful “encumbrance” of accounts with programmable delegation. --- ## 🔐 Wallets as the New Password Managers One of the underlying shifts discussed is the movement **away from traditional credentials (username + password)** toward **agent-based, context-aware access**. While password managers weren’t explicitly named, the session consistently circled around the same goal: > “How do we securely log in a user without needing a username, password, or even email?” Key takeaways: - **Magic links and passkeys** were referenced as stepping stones — but still dependent on centralized services. - **Oauth3 + TEEs** offer an alternative path: - Store credentials (like refresh tokens or JWTs) **inside a secure enclave** - Delegate usage through **policy-based access**, rather than repetitive logins - Enable “zero-click” access via **implicit, context-driven consent** (e.g., wallet connected, app whitelisted) This frames the **wallet not just as a key manager**, but as a **next-gen password manager**: - It governs access across services - It holds verifiable credentials (tokens, attestations) - It enforces scoped delegation, expiration, and revocation ### ➡️ TL;DR > **Wallets + OAuth3 + TEEs = programmable passwordless UX** > > Instead of managing secrets, users manage trust policies — and agents carry out their intent securely. --- ## 🧠 Intelligent Context & UX - **Smart defaults > zero-click**: - Detect wallet presence and pre-fill. - Infer intent and minimize prompts. - Use policy and context to gate interactions. - Oauth3 becomes an **agent-based UX layer**: - Understands intent - Handles delegated permission flows - Avoids unnecessary user interruption --- ## 🧩 Architecture & Standards Direction - Follow the model of `EIP-1193`: - Standardize **message interfaces**, not the implementations. - Let devs pack arbitrary policy data into generic payloads. - TEEs enable: - Secure JWK/refresh token storage - Proxying auth through trusted computation - Enforced policy boundaries with auditability - SDKs/Templates: - Don’t standardize every OAuth flow. - Build SDK templates per resource provider (Telegram, Twitter, etc.) - Encourage “template + rules” architecture. --- ## 🎮 Credible Commitments & Game Theory - Commitments = **delegated, conditional agency**: - “Let this group tweet from my account once.” - “Allow access to my analytics if you hold this NFT.” - **NFTs** as: - Context-aware access tokens - Soft credentials with programmable rules - Interoperability = **capability transfer**, not just login compatibility. --- ## 💥 Use Case Convergences ### 1. Oauth as an Intelligent Agent API - Not just authentication — **delegation and access policy routing**. - Example: "Give this agent inbox access for 12h under X policy." ### 2. TikTok Comment Creator Fund - Delegate publishing rights to AI agents. - Use Oauth3 & TEEs for: - Authenticated content generation - Safe posting - Identity-mapped reward mechanisms ### 3. Bootstrapping Agent Identity - Agents need verifiable: - Origin - Intent - Reputation - Enabled by signed attestations and Oauth3 policy scopes. ### 4. Super Apps as Agents - SuperApp = Agent with multi-surface access - Agents interact across APIs, apps, and devices based on: - User permissions - Context - Rules --- ## 🎯 Summary of Convergences | Concept | Reframed As | |----------------|----------------------------------------------------------| | **Oauth3** | Programmable trust layer + routing middleware | | **TEE** | Boundary of permissioned, verifiable computation | | **NFTs** | Intent-carrying access tokens | | **Apps** | Agents with behavioral models and scoped permissions | | **Web3** | Programmable delegation and composable user autonomy | ---