- From: Eric Korb <eric.korb@accreditrust.com>
- Date: Mon, 1 Dec 2014 14:32:22 -0500
- To: Manu Sporny <msporny@digitalbazaar.com>
- Cc: Jason Lewis <jason@yetanalytics.com>, ba-standard@googlegroups.com, Credentials Community Group <public-credentials@w3.org>, Brian Brennan <brian@mozillafoundation.org>, "openbadges-dev@googlegroups.com" <openbadges-dev@googlegroups.com>
- Message-ID: <CAMX+RnBkLC9JwtwgJLR9yDMAnXMcB5tvXfzbs-+dX-QZxf5SRA@mail.gmail.com>
@Manu +1 Great responses. *"Trust only credentials that are TrueCred*™ *verified."* ---------------------------------- Eric Korb, President/CEO - accreditrust.com GoogleVoice: 908-248-4252 http://www.linkedin.com/in/erickorb @erickorb @accreditrust On Mon, Dec 1, 2014 at 2:17 PM, Manu Sporny <msporny@digitalbazaar.com> wrote: > On 11/19/2014 10:35 PM, Jason Lewis wrote: > > Although I tend to feel graph normalization (I say feel b/c I > > haven't done the math myself) is a potentially efficient and secure > > signing method, I'm hesitant to subscribe to a method tied to an > > application-layer protocol (i.e., RDF seems bound to HTTP). > > The algorithm isn't tied to an application layer protocol. RDF isn't > bound to HTTP, but it is bound to URIs/IRIs (that is, it's tied to the > identifiers that are used on the Internet and the Web). You may want to > take a look at the link below for some background: > > http://manu.sporny.org/2013/sm-vs-jose/ > > > I'm not proposing an alternative here, just that we not jump the gun > > on authentication of badges; perhaps start with authentication as an > > extension and then promote what works best to a first-class member, > > or, provide a facility for multiple methods. > > Keep in mind that what's being proposed isn't that badges MUST be > authenticated. This is an optional thing. If you want to ensure that the > badge is cryptographically verifiable, even if the originator of the > badge goes down/out of business, then you can optionally digitally sign > the badge. > > > Me, I'm old-fashioned. I like Diffie-Hellman PKI. It's not the > > fastest, but we're not talking about real-time competency provenance > > via OBI yet, are we? > > We're talking about ensuring that badges/credentials can be > cryptographically verifiable. For example, you want to make sure that > the doctor that's going to be operating on your patients actually passed > their board exam w/o spending a fortune trying to figure that out. You > want to make sure that the contractor you hired actually has the > qualifications that they say they have w/o spending a fortune doing a > background check on them, etc. > > > Also, we have a well-established infrastructure for verifying RSA > > keys (follow the instructions in my .sig if you want my pubkey). Not > > that I'm saying that's the best method, just that. > > We're proposing a machine-readable mechanism to do what you're proposing > above. So that a machine can look at a credential, understand where the > public key that should do the verification resides, get the key, verify > the owner of the key, and verify the authenticity of the badge/credential. > > > .. well... > > > > [XKCD comic on standards proliferation] > > > > Yeah... that. > > There is currently no standard that does everything stated above. There > is JOSE, which does bits and pieces of it, but the current debate is > whether JOSE should be re-used, or whether we should go with the SM > stack, or some sort of hybrid. > > > I'm not offering a universal solution. Just warning against > > insisting upon one. > > There is no universal solution to anything on the Internet/Web. There > are, however, standards that suggest the best way to do particular > things (especially when it comes to security). These standards are > usually arrived at after years of public debate and technical research > into alternatives. What's being suggested is that we really get into the > meat of this public debate and technical research sooner than later. > > Hope that helps give a bit of background wrt. your comments. :) > > -- manu > > -- > Manu Sporny (skype: msporny, twitter: manusporny, G+: +Manu Sporny) > Founder/CEO - Digital Bazaar, Inc. > blog: High-Stakes Credentials and Web Login > http://manu.sporny.org/2014/identity-credentials/ > >
Received on Monday, 1 December 2014 19:33:10 UTC