I partially implemented the UMA spec. It’s a bunch of KYC and surveillance hooks hiding behind a lightning address. Initially I was interested (might still be) but it’s really an information harvesting and surveillance system grafted on to the lightning address protocol.