- From: Mike Lodder <mike@sovrin.org>
- Date: Wed, 8 May 2019 19:41:50 +0000
- To: "daniel.hardman@evernym.com" <daniel.hardman@evernym.com>, Credentials Community Group <public-credentials@w3.org>
- Message-ID: <DM6PR06MB5020ACD167A71ED54228A437F3320@DM6PR06MB5020.namprd06.prod.outlook.com>
I would like to participate ________________________________ From: Daniel Hardman <daniel.hardman@evernym.com> Sent: Wednesday, May 8, 2019 1:40 PM To: Credentials Community Group Subject: committing fraud with credentials At IIW last week, Rouven Heck called a session to explore the topic of committing fraud with link secrets. This was a very interesting session, and I think it generated some new knowledge and a set of follow-on topics. I then called a follow up session on the broader topic of committing fraud with credentials in general--both ZKP- and non-ZKP-based. We had a number of smart minds in the room, including good representation from the CCG's own Daniel Burnett. I intend to pursue this topic in greater detail. In the second IIW session, we began to create a matrix that lists particular attack scenarios as rows, and that shows remediations for particular credential types as columns. It is still quite sparse, but already has important info in it. Anybody can comment on the spreadsheet<https://docs.google.com/spreadsheets/d/1HALoNgZ7GTogw324squ7LRL4unfLSmPH_8B1ibxCQgE/edit#gid=0>; if you want edit access, ping me. I intend to pursue this topic more carefully, and hope to produce some kind of a whitepaper about it. If people would like to collaborate, let me know. We could do this under the auspices of the CCG, as an official work item, but I am not specifically proposing that here. I will probably publish something under my own name regardless. --Daniel
Received on Wednesday, 8 May 2019 19:42:15 UTC