- From: Bohdan Andriyiv <bohdan.andriyiv@validbook.org>
- Date: Fri, 20 Jul 2018 14:43:23 +0300
- To: Henry Story <henry.story@bblfish.net>
- Cc: Credentials Community Group <public-credentials@w3.org>
- Message-ID: <CALqw9pWnRn9xeFU-qvUwSTgfYOGARLtjyFaXFbpTTpAN9Px5_g@mail.gmail.com>
Hi Henry, Thanks for sharing your blog posts. I think the ideas of institutional WoT and Security Screen (screen independent from application) are very useful in a sense that they thought provoking, and problem exposing. However I do not think that solutions as described are practical. Institutional WoT. There are too many sites and too much multifaceted information about them for government institutions to vouch for. The practical solution will be PageRank like algorithm that takes into account different points of data (not just vouching from institutions) to estimate trustworthiness of sites. Security Screens (screen, or part of screen independent from applications to show security information) People want to do stuff and go places. Even if we have independent screen on keyboard or reserve part of usual screen to show verifiable security information people will ignore, miss it. The practical solution will be to use PageRank like trust score and block screen completely for sites that have small trust score, forcing user to reconsider going to dangerous site. I agree that Verifiable Claims should be used for certificates as they can provide all information about website that website want to share about itself and people want to read. I think Verifiable Claims standard is good for it because it is flexible and can be used to show information securely on two layers: human friendly - presentation layer and machine readable JSON layer. See as example - Validbook Statements <http://futurama1x.validbook.org/statements> (for example - http://futurama1x.validbook.org/statements/templates/Certificate%20of%20Completion-15 ) As for Institutional WoT, I think this is a good idea if taken as a part of big general WoT, where websites (legal entities that created websites) are vouched for, not only by the government institutions, but by everyone (government institutions , private institutions, people). Website can make a statement (for example like this - http://futurama1x.validbook.org/arbitration/undefined/unique-representation-of-a-living-human-individual) and it can be backed by anyone. Then PageRank like algorithm can calculate trust score (taking away mental load from people to remember to check security screen) and block screen to prevent user from going to dangerous site. Bohdan On Fri, Jul 20, 2018 at 1:18 PM, Henry Story <henry.story@bblfish.net> wrote: > Hi all, > > I have been thinking a bit about servers and applications credentials > recently > which is the opposite of what I have been doing for a long time namely > user > credentials. But since that also falls under Verifiable Claims, I thought > you'd > be interested. > > Discussing this topic in various forums one often > finds one resistance to new ideas relating to the huge failure in the > space of > user interfaces for this technology. Many have been burned by the many > failures in that space. So I decided to address that problem with a > light weight and quite intuitive detour through modal logic. If you have > ever > dealt with a salesman coming to your door, then you can follow the > reasoning.... > This is then mapped to the UI problem where I came to the conclusion to my > amazement > that there is actually a very useful cyber-security application for the > MacBook TouchBar! > > Phishing in Context > Epistemology of the Screen > https://medium.com/cybersoton/phishing-in-context-9c84ca451314 > > That follows up on a previous post > > "Stopping (https) Phishing" > https://medium.com/cybersoton/stopping-https-phishing-42226ca9e7d9 > > which shows that the problem with X509 server certs is the complete > poverty of data that > comes with it. So I make a case that one needs much richer Verifiable > Server Claim > information if it is to be interesting to the user finding out about the > web site > he is looking at. (or the app he is using) > > The flexible answer is to allow the browser to go online and fetch the > information > from the institutional web of trust. But the efficient one would be for > the server > to send a verifiable claim containing the same info and signed by the > institution. > I think one could be flexible and allow both. But for that one would need > very > flexible verifiable claims that could contain pretty much any data > (as shown in the example of info from Company House). So I think that > means X509 is out > long term. Then one could have Verifiable claims with 1 day time to live. > > So this may be an additional angle that can be useful to further the > causes this group > is interested in. > > > Feedback welcome, > > Henry Story > > > >
Received on Friday, 20 July 2018 11:43:47 UTC