- From: Mike Lodder <mike.lodder@evernym.com>
- Date: Thu, 14 Jun 2018 08:42:05 -0600
- To: "Challener, David C." <David.Challener@jhuapl.edu>
- Cc: Sam Smith <sam.smith@sovrin.org>, "Jordan, John CITZ:EX" <John.Jordan@gov.bc.ca>, "Stone, Matt" <matt.stone@pearson.com>, W3C Credentials Community Group <public-credentials@w3.org>
- Message-ID: <CABW+ph-1C6cs9V-zjFptNxAkT_JswOO7WkODNn48LrtPq51S4w@mail.gmail.com>
Agreed. If its private by default, it shouldn't limit my ability to disclose as I see fit. On Thu, Jun 14, 2018 at 8:38 AM, Challener, David C. < David.Challener@jhuapl.edu> wrote: > Ah – but I think it should be an individual decision. If I make my life > easier by letting people know I am a celebrity (I am not), then that is my > right. I read a funny story about someone who thought they wanted to be > anonymous as a celebrity, but after trying it for a bit decided they > appreciated the perks they got when people did know it. The point is, > that we should not make decisions for other people “in their best > interests” – unless they are our children. > > > > *From:* Mike Lodder [mailto:mike.lodder@evernym.com] > *Sent:* Thursday, June 14, 2018 10:01 AM > *To:* Challener, David C. <David.Challener@jhuapl.edu> > *Cc:* Sam Smith <sam.smith@sovrin.org>; Jordan, John CITZ:EX < > John.Jordan@gov.bc.ca>; Stone, Matt <matt.stone@pearson.com>; W3C > Credentials Community Group <public-credentials@w3.org> > > *Subject:* Re: existing identifiers for people > > > > Well said Sam. Even if there is data I don't mind if others know, I might > not want others to know because any information leakage could correlate me > eventually (strong problem) but enhances limits in the short term or to > those who don't have the resources to correlate me (weak problem). > > > > +1 > > > > On Thu, Jun 14, 2018 at 7:24 AM, Challener, David C. < > David.Challener@jhuapl.edu> wrote: > > Sam, I like what you say. > > I also think that there are different categories of things – some we don’t > mind people knowing and some which we do. That I graduated from a > particular high school or have a PhD are not really privacy type things > (You can look up someone’s thesis on the ‘net after all). But how much > money I have is not something I would share generally. So labeling > everything as being private data seems wrong. > > > > *From:* Sam Smith [mailto:sam.smith@sovrin.org] > *Sent:* Wednesday, June 13, 2018 3:34 PM > *To:* Challener, David C. <David.Challener@jhuapl.edu> > *Cc:* Jordan, John CITZ:EX <John.Jordan@gov.bc.ca>; Stone, Matt < > matt.stone@pearson.com>; W3C Credentials Community Group < > public-credentials@w3.org> > > > *Subject:* Re: existing identifiers for people > > > > In general privacy is an ephemeral quality. It tends to decrease over > time as diclosures or interactions happen. > > Its helpful to me to phrase it as the Strong Problem of privacy and the > Weak Problem of Privacy. > > > > The strong problem is not solvable given correlators with essentially > unlimited data storage and compute capability. Any set of disclosures may > be correlated given enough time etc. > > > > The weak problem is solvable. The weak problem is that correlation has a > cost. Building privacy systems such that the cost of correlation exceeds > the value of the correlated data is a solvable problem. Over time the > value of correlation diminishes. Correlating what I did ten years ago in > terms of privacy preservation is not nearly so important or harmful to me > as correlating what I am doing now. IMHO DIDs are meant to solve the weak > problem. Going down the rabbit hole of trying to solve the Strong problem > usually does not end well. > > > > > > On 13 Jun 2018, at 07:54 , Challener, David C. <David.Challener@jhuapl.edu> > wrote: > > > > You say: " Of course, issuers need to properly manage their keys, > especially their private ones" > And of course they should. But if there is no list of things that are > signed, it is not easily possible to TELL. And that leads to the scenarios > that are actually happening today, where supposed good keys are used to > sign malware. > > -----Original Message----- > From: Jordan, John CITZ:EX [mailto:John.Jordan@gov.bc.ca > <John.Jordan@gov.bc.ca>] > Sent: Wednesday, June 13, 2018 9:51 AM > To: Challener, David C. <David.Challener@jhuapl.edu> > Cc: Stone, Matt <matt.stone@pearson.com>; W3C Credentials Community Group > <public-credentials@w3.org> > Subject: Re: existing identifiers for people > > Ok ... I’m not an expert in crypto ... the point I was responding to was > to be concerned about a surveillance pattern when citizens use their Govt > issued identity. That is not trust building. Of course we are proceeding > purposely and carefully and doing our work in the open so we can benefit > from the community. > > I’m not sure the scenario you describe is applicable since we do know what > our issuer service has signed and there will be a well known DID / DID doc > under the control of the government ID issuing service that is presumable > immutable given the properties of the decentralized ledger. If some bad > actor tries to create fake ID then they should fail as verifiers should be > aware of the authoritative DIDs for the issuers they trust. Of course, > issuers need to properly manage their keys, especially their private ones. > > As far as weak crypto, my experience thus far is the community is being > very deliberate about the algorithm and key specifications so this should > be mitigated by properly vetted standards. > > On Jun 13, 2018, at 06:39, Challener, David C. <David.Challener@jhuapl.edu> > wrote: > > I think if you explicitly exclude those types of things you are making a > bad mistake. > We currently have malware being signed by keys that are from device driver > manufacturers. It isn't clear if the private key was compromised, the key > was weak, or someone was bribed, etc. But this shows one of the main > problems with certificates -- there is no authoritative list of what has > been signed, so it is hard to determine that something is out there, > purporting to have been signed, when in fact it was not signed with > authority. > If you make this an anti-pattern, it looks to me as though you have made > it impossible to solve this problem. > Since the signing authority presumably knows that it signed the > certificate, all it is getting back is that the cert is being used. Where > and how can be obscured. > > -----Original Message----- > From: Jordan, John CITZ:EX [mailto:John.Jordan@gov.bc.ca > <John.Jordan@gov.bc.ca>] > Sent: Wednesday, June 13, 2018 9:34 AM > To: Challener, David C. <David.Challener@jhuapl.edu> > Cc: Stone, Matt <matt.stone@pearson.com>; W3C Credentials Community > Group <public-credentials@w3.org> > Subject: Re: existing identifiers for people > > For sure there is no ping back to the issuer at verification time > (including revocation checks) ... that is an anti-pattern that we intend to > be specifically including at our policy level when we evaluation these > kinds of network based solutions. > > Interesting about the verification post the demise of an organization. > Technically doable .. it will be a social level decision if those > credentials have any weight depending on the context they were issued under > I expect. > > As a side note, my colleague Stephen Curran has been working out how to do > offline verification which we think is a reasonable and interesting use > case for verifiable credentials. > > On Jun 13, 2018, at 06:26, Challener, David C. <David.Challener@jhuapl.edu > <mailto:David.Challener@jhuapl.edu <David.Challener@jhuapl.edu>>> wrote: > > And the approach that was written up – that specifically had the > credentialing authority check if the credential had been revoked doesn’t > need (or observe) either 1 or 2, so if those are hard requirements then the > use case fails. > > From: Stone, Matt [mailto:matt.stone@pearson.com <matt.stone@pearson.com>] > Sent: Tuesday, June 12, 2018 5:06 PM > To: Challener, David C. > <David.Challener@jhuapl.edu<mailto:David.Challener@jhuapl.edu > <David.Challener@jhuapl.edu>>> > Cc: W3C Credentials Community Group > <public-credentials@w3.org<mailto:public-credentials@w3.org > <public-credentials@w3.org>>> > Subject: Re: existing identifiers for people > > This approach speaks to a couple of requirements from the working group... > > 1. Verifiable Credentials must be privacy respecting and support > non-correlation 2. Verifiable Credentials must continue to verify even > if the issuer goes out of business, is non-functional, or unreachable. > > * unless a verifier needs a deeper proof, they don't have to call the > state to see, and understand and trust a physical driver's license (and the > state never knows it was presented) > Both of these cases require that the VC verify w/out the issuer being > party to the transaction. If the VC validates, then the verifier can trust > that the statement was made by that issuer on that date. Whether it's > still true today is another question entirely. This will be solved by some > protocol magic that isn't fully invented yet. There is a simplistic > placeholder in the data model spec that provides a revocation list - one > that the issuer would maintain. So in the engineer example, as the > Verifier is verifying the VC, if the VC includes a URL to a revocation > list, the verifier must/should/could check there also (the purpose of the > verification and the needs of the verifier determines whether this is a > MUST or optional step). > > The revocation list does open up a privacy question relating to > non-correlation. The sovereign foundation's approach support zero > knowledge proofs deal with revoking and rescinding credentials in a > different way - one that relies on both data and protocol implementation. > This is out of scope of the Working Groups's current charter, but it's > exciting to see it emerge. > > -stone > > > ===== > Matt Stone > 501-291-1599 > > > On Tue, Jun 12, 2018 at 2:09 PM, Challener, David C. < > David.Challener@jhuapl.edu<mailto:David.Challener@jhuapl.edu > <David.Challener@jhuapl.edu>>> wrote: > What I don’t understand is the ability to revoke the credential appears to > require the verifier to go back to the issuer to see if the credential is > revoked. “the society can simply mark the DID as not active in some way on > it’s end of the connection” > If this is true, then I don’t understand why the verifier doesn’t go to > the society to see if it is valid initially – “Here is a DiD. Are they > credentialed?” instead of “Here is a credential. Is it valid?” > It appears to entail less work, and additionally more secure, as the > society would always have a list of credentialed DiDs, so if someone > internally was bribed and got control of a private key, it would be obvious > that an invalid credential had appeared. > > From: Stone, Matt > [mailto:matt.stone@pearson.com <matt.stone@pearson.com>< > mailto:matt.stone@pearson.com <matt.stone@pearson.com>>] > Sent: Tuesday, June 12, 2018 4:00 PM > To: Samantha Mathews > <samantha@venn.agency<mailto:samantha@venn.agency <samantha@venn.agency>>> > Cc: Jordan, John CITZ:EX > <John.Jordan@gov.bc.ca<mailto:John.Jordan@gov.bc.ca > <John.Jordan@gov.bc.ca>>>; > public-credentials@w3.org<mailto:public-credentials@w3.org > <public-credentials@w3.org>> > > Subject: Re: existing identifiers for people > > Proving a representation of personal Idenitiy will likely have multiple > mechanisms. > > * The Civil Engineer, in this case must have a DID and convince the > Engineering Society to issue the credential to that DID. > * The engineering society must have a process to confirm and trust that > the DID is in fact owned and controlled by the Engineer who took the test > and met the requirements for certification and licensure. > * Subsequently when the engineer presents the verifiable credential to > the prospective employer for verifications, she must also provide proof > that the she is the owner/controller of the DID in the credential, in other > words, she much establish her digital identity w/ the employer before they > could trust the credential is relevant to this transaction. > Who or which organization(s), new or existing, will facilitate that > specific coordination between physical and digital worlds? In the physical > world, we trust things like drivers's licenses and passports, so perhaps a > regulatory body will continue to play that role, by issuing a verified > credentials that validates the engineer's identity. The engineer would > include that in the application w/ the society and perhaps in the > presentation to the employer. > > This probably opens a new market place for physical identity > verification, in the cases that require this level of proof. The > fundamental requirement is that the Verifier knows the mechanism that the > Issuer used to validate the identity of the DID holder to whom the > credential was issued, and agrees that this mechanism meets their > requirements for the verification transaction. > > How will we express the rigor of identity check that a Verifiable > Credential has undergone? Is there such a thing as "rigor of identity > check" or, simply another issuer that is "trustworthy"? > > -stone > > > ===== > Matt Stone > 501-291-1599 > > > On Tue, Jun 12, 2018 at 1:22 PM, Samantha Mathews <samantha@venn.agency< > mailto:samantha@venn.agency <samantha@venn.agency>>> wrote: > +1 > thank-you for explaining this, much clearer to me now. > > Samantha Mathews > ------------------------------------------------------- > Co-Founder & CEO, Venn.Agency > The best way to predict the future is to build it. > Phone: 323-740-9425 Linkedin > ------------------------------------------------------- > samantha@venn.agency<mailto:samantha@venn.agency <samantha@venn.agency>> > > On Tue, Jun 12, 2018 at 12:06 PM, Jordan, John CITZ:EX < > John.Jordan@gov.bc.ca<mailto:John.Jordan@gov.bc.ca <John.Jordan@gov.bc.ca>>> > wrote: > So … I think there is a somewhat problematic conceptual issue here around > what DIDs are and how they could be deployed. > > DIDs are not identifiers that directly map to a person or any other > entity/thing … in fact I think that is a rather strong anti-pattern. DIDs, > I think, are more accurately describable as an address to the DID Doc which > itself tends to contain some form of public key material and an endpoint > where a piece of software can be connected to. > > DIDs (and the DID Doc) enable a connection between two pieces of software > that can negotiate a secure peer to peer channel. Those pieces of software > could be under the control of a person representing themselves, or > representing a legal entities such as a business or perhaps a thing. In any > of these cases there is an exchange between the peers whereby the two > pieces of software use a pair of DIDs (ideally unique to that particular > connection but not necessarily) to create this connection using information > contained in the DID Doc. The material in the DID Doc is cryptographic key > material necessary to establish a one or two way signed authentication as > well as the endpoint where the connection can be made. > > Once this secure digital channel is established … then the two pieces of > software, under the direction of a human, or perhaps some rules that were > configured/programmed by humans, engage in an exchange of data to create a > relationship. This data exchange is what determines the nature of the > relationship between the parties that are controlling the software. > > Consider the following pattern: > > Issuer <====> Holder <====> Verifier > > And let’s assume the Issuer is the Engineering Society, the Holder is an > accredited Civil Engineer, and the Verifier is a person wanting to hire a > Civil Engineer. For the sake of simplicity, we are leaving out that these > folks all work for some form of legal entity. We will assume these are > direct peer to peer interactions directly between people with appropriate > software. > > In our scenario where, the verifier would like the engineer to prove to > him that she is an accredited civil engineer so he can hire her. The > engineer has a verifiable credential in her software that was issued to her > by the engineering society and she would like to use that credential to > prove she is an engineer so she can get the job. > > This is the realm of verifiable credentials … a new form of digital data > and interactions where issuers (Engineering Society) can ofer a new form of > data (verifiable credential) to a holder (our Civil Engineer) such that the > Holder can share that credential with another party (Verifier). The > verifier is then able to independently verify the integrity and source of > this data without the involvement of the issuer. > > Verifiable credentials are possible because of DIDs and its associated DID > Doc. > > In our scenario, the verifiable credential the engineer offers to her > prospective employer is verifiable because the issuer has a publicly > available DID and DID Doc which contains the cryptographic key material > necessary to verify the credential in play in this interaction. The > verifier knows this DID because it is embedded in the verifiable > credential. Right here we can see that the issuer may now have at least two > DIDs, its public DID (used to allow verifiers to verify credentials the > Engineering Society issues) and potentially a different DID specific to the > connection it has with the holder, our engineer. This way if the > Engineering society wishes to disable the connection with the engineer, say > our engineer decides to retire and not renew her status, the society can > simply mark the DID as not active in some way on it’s end of the > connection. The society would still have its public DID as presumably it is > still issuing accreditation credentials to others. > > It is the nature of the verifiable credentials that determine the nature > of the relationship. In our scenario, the verifying person looking to hire > this engineer uses his software to verify the credential. However, it is a > business decision by humans to decide if they give any trust to the > credential based on their belief that the Engineering Society is a > legitimate issuer of accreditations for engineers. Normally this is true in > the case of engineers as there will be a law in the jurisdiction governing > the society. In other cases, it could be another kind of specialized body > that does the issuing such as a better business bureau, or a researcher > network, etc. > > None of this trust has to do with the DID itself. The DID is simple the > means by which the two pieces of software can reliably connect. > > What is think is happening in some of these discussions and DID use cases > is there is a conflation of DID, Verifiable Credentials, and in some cases > the “meaning” that can be conveyed in the human realm by what a Verifiable > Credential(s) represent (eg an engineering accreditation issued by a > legally authorized engineering society). > > John > > > > > From: Phil Barker > <phil.barker@pjjk.co.uk<mailto:phil.barker@pjjk.co.uk > <phil.barker@pjjk.co.uk>>> > Date: Tuesday, June 12, 2018 at 10:11 AM > To: "public-credentials@w3.org<mailto:public-credentials@w3.org > <public-credentials@w3.org>>" > <public-credentials@w3.org<mailto:public-credentials@w3.org > <public-credentials@w3.org>>> > Subject: Re: existing identifiers for people > Resent-From: > <public-credentials@w3.org<mailto:public-credentials@w3.org > <public-credentials@w3.org>>> > Resent-Date: Tuesday, June 12, 2018 at 10:10 AM > > > Presumably there is a use case for someone to be able to assert that their > DID represents the same person as an ORCID or ISNI? > > Phil > > On 12/06/18 18:03, Steven Rowat wrote: > On 2018-06-12 8:50 AM, Siegman, Tzviya wrote: > > Hi All, > > I’m seeing a lot of use cases for persistent identifiers for people. In > the STEM world, the ORCID [1] is widely used. Some publishers (like the one > I work for) require authors to have an ORCID. There is an overlapping > system called ISNI [2]. These are real-world scenarios that already have > ecosystems supporting them. > > That's very interesting, and the Wikipedia page for it shows that it's > widespread and increasing rapidly. > https://en.wikipedia.org/wiki/ORCID<https://urldefense.proofpoint.com/ > v2/url?u=https-3A__en.wikipedia.org_wiki_ORCID&d=DwMFaQ&c=0YLnzTkWOdJl > ub_y7qAx8Q&r=KheINWPzU3x8Jj96NXLwS0k5Y5jGbk-Gi1U5Cdx5914&m=LxoFG_fvziQ > 3r1xoEekGOmpx131G82wdxFZ-7BD1hSs&s=lD9XYwlyK_WRn8Q97uUKXw23NW_lZFAGuuJ > eDLoFLeA&e=> > > But it seems to me that it's happening at a different logical layer than > DID, and that DID will have different capabilities; and so both could be > used together if DID becomes widespread. > > For example, the ORCHID doesn't appear to support pseudonymous use, or > multiple use, or to be safe for web commerce (via public/private keys); or > Self-Sovereign Identity in general; the control of the data is by the > ORCHID organization, which is centralized. > > These are just first impressions; perhaps I'm mistaken. But I don't think > it's solving the same problem DID can potentially solve. ORCHID appears to > be for researchers embedded in institutions who are using publisher > organizations, whereas DID is attempting to be useful -- though admittedly > in a similar way at some points -- for everybody on the internet. > > Steven > > > > > Tzviya > > [1] > https://orcid.org/<https://urldefense.proofpoint.com/v2/url?u=https-3A > __orcid.org_&d=DwMFaQ&c=0YLnzTkWOdJlub_y7qAx8Q&r=KheINWPzU3x8Jj96NXLwS > 0k5Y5jGbk-Gi1U5Cdx5914&m=LxoFG_fvziQ3r1xoEekGOmpx131G82wdxFZ-7BD1hSs&s > =KI1N-3aWjGWE1faJyA812OrASe5WEjy-NdUFZ3NKEHY&e=> > > [2] > http://www.isni.org/<https://urldefense.proofpoint.com/v2/url?u=http-3 > A__www.isni.org_&d=DwMFaQ&c=0YLnzTkWOdJlub_y7qAx8Q&r=KheINWPzU3x8Jj96N > XLwS0k5Y5jGbk-Gi1U5Cdx5914&m=LxoFG_fvziQ3r1xoEekGOmpx131G82wdxFZ-7BD1h > Ss&s=RQlvMbU-sdcbPsXK5xqlBanIhTd01El7iEw78SQCloM&e=> > > *Tzviya Siegman* > > Information Standards Lead > > Wiley > > 201-748-6884 > > tsiegman@wiley.com<mailto:tsiegman@wiley.com <tsiegman@wiley.com>><mailto: > tsiegman@wiley.co <tsiegman@wiley.co> > m<mailto:tsiegman@wiley.com <tsiegman@wiley.com>>> > <mailto:tsiegman@wiley.com <tsiegman@wiley.com><mailto:tsiegman@wiley.com > <tsiegman@wiley.com>>><mailto:tsiegman > @wiley.com<mailto:tsiegman@wiley.com <tsiegman@wiley.com>>> > > > -- > > Phil > Barker<http://people.pjjk.net/phil<https://urldefense.proofpoint.com/v > 2/url?u=http-3A__people.pjjk.net_phil&d=DwMFaQ&c=0YLnzTkWOdJlub_y7qAx8 > Q&r=KheINWPzU3x8Jj96NXLwS0k5Y5jGbk-Gi1U5Cdx5914&m=LxoFG_fvziQ3r1xoEekG > Ompx131G82wdxFZ-7BD1hSs&s=FNX_MNO5D0hI7Fd2uqE2Q28cIBIwY7jbP4sDJxjCT-k& > e=>>. > http://people.pjjk.net/phil<https://urldefense.proofpoint.com/v2/url?u > =http-3A__people.pjjk.net_phil&d=DwMFaQ&c=0YLnzTkWOdJlub_y7qAx8Q&r=Khe > INWPzU3x8Jj96NXLwS0k5Y5jGbk-Gi1U5Cdx5914&m=LxoFG_fvziQ3r1xoEekGOmpx131 > G82wdxFZ-7BD1hSs&s=FNX_MNO5D0hI7Fd2uqE2Q28cIBIwY7jbP4sDJxjCT-k&e=> > PJJK Limited<https://www.pjjk.co.uk<https://urldefense. > proofpoint.com/v2/url?u=https-3A__www.pjjk.co.uk&d=DwMFaQ&c= > 0YLnzTkWOdJlub_y7qAx8Q&r=KheINWPzU3x8Jj96NXLwS0k5Y5jGbk > -Gi1U5Cdx5914&m=LxoFG_fvziQ3r1xoEekGOmpx131G82wdxFZ-7BD1hSs&s=RG- > OuBt9rq6fKKVBNxcf-LhfVaOUKyUUCD2F2PvTmsc&e=>>: > <https://www.pjjk.co.uk%3chttps:/urldefense.proofpoint.com/v2/url?u=https-3A__www.pjjk.co.uk&d=DwMFaQ&c=0YLnzTkWOdJlub_y7qAx8Q&r=KheINWPzU3x8Jj96NXLwS0k5Y5jGbk-Gi1U5Cdx5914&m=LxoFG_fvziQ3r1xoEekGOmpx131G82wdxFZ-7BD1hSs&s=RG-OuBt9rq6fKKVBNxcf-LhfVaOUKyUUCD2F2PvTmsc&e=%3e%3e:> > technology to enhance learning; information systems for education. > CETIS LLP<https://www.cetis.org.uk<https://urldefense.proofpoint. > com/v2/url?u=https-3A__www.cetis.org.uk&d=DwMFaQ&c= > 0YLnzTkWOdJlub_y7qAx8Q&r=KheINWPzU3x8Jj96NXLwS0k5Y5jGbk > -Gi1U5Cdx5914&m=LxoFG_fvziQ3r1xoEekGOmpx131G82wdxFZ-7BD1hSs&s= > yt9rpvlI30b0gmx3zWVGH9bIMshJRncTkgMzql4cfpc&e=>>: > <https://www.cetis.org.uk%3chttps:/urldefense.proofpoint.com/v2/url?u=https-3A__www.cetis.org.uk&d=DwMFaQ&c=0YLnzTkWOdJlub_y7qAx8Q&r=KheINWPzU3x8Jj96NXLwS0k5Y5jGbk-Gi1U5Cdx5914&m=LxoFG_fvziQ3r1xoEekGOmpx131G82wdxFZ-7BD1hSs&s=yt9rpvlI30b0gmx3zWVGH9bIMshJRncTkgMzql4cfpc&e=%3e%3e:> > a cooperative consultancy for innovation in education technology. > > PJJK Limited is registered in Scotland as a private limited company, > number SC569282. > CETIS is a co-operative limited liability partnership, registered in > England number OC399090 > > > > Samuel M. Smith Ph.D. > > Technical Governance Board > > Sovrin Foundation > > mobile: 1.801.592.8230 > > email: sam.smith@sovrin.org <sam.smith@sovrin.org> > > > > > > > > -- > > Mike Lodder > > Senior Crypto Engineer > > > > [image: Image removed by sender.] > -- Mike Lodder Senior Crypto Engineer
Attachments
- image/jpeg attachment: _WRD000.jpg
Received on Thursday, 14 June 2018 14:42:32 UTC