Re: WoN Re: Public consultation on EU digital principles

Thanks David for describing TRAIN concisely. 


> On 9. Aug 2021, at 22:12, David Chadwick <d.w.chadwick@verifiablecredentials.info> wrote:
> 
> In the TRAIN project we have devised an alternative strategy for trusting VC issuers,

It may be alternative, but I think logically it is very similar, if I have understood
it correctly, that is.

> based on the existing concept of Trust Lists as standardised by ETSI. It works like this.

> Every VC that is issued by any issuer, contains a Terms of Use containing the trust scheme(s) that the issuer is a member of (specified as DNS names). These can be true or false statements, it does not matter.

So let us imagine the National Health Service in the UK is giving out Vaccination Credentials, 
Credentials of having had Covid (and so having antibodies), or short lived credentials of not having 
it. And it is giving out quite a lot of other credentials too, perhaps certificates of 
being a nurse, a doctor, working in the health service. The NHS is vast.  

So each of these certificates would then have a trust scheme as a DNS name listed in the Terms of use.
So perhaps something like gov.uk ? 
If those Certificates are going to also be useful for traveling to France, should it then also add
gouv.fr, usa.gov, … and perhaps some supranational institutions such as the UN and the EU? 

This as you can guess is where the web of Nations starts playing a role. 

> 
> Any DNS owner can create their own trust scheme and decide which VC issuers are members of it and therefore are trusted to issue VCs of a certain type (with a certain schema). The DNS owner adds a URL RR to their DNS entry containing a TRAIN formatted URL.

In our example that would be gov.uk, gouv.fr etc. Because they make the law (following 
democratic principles)  and enforce it over a territory.  And  we need to tie the domain 
entry in the covid claim you mentioned above to the list of entities specialising in that area.

So perhaps gov.uk’s DNS TRAIN entry (or something similar) would point to a resource 
on say https://data.gov.uk/ listing all the registrars in the UK using an ontology to
specify which does what, and what claims they are entitled to make.

(My guess is that ETSI is not using linked data at this point, but we don’t need to 
get hung-up on that)

> 
> The TRAIN open source code will read this RR, dereference the URL and expect to find an ETSI trust list published at this https URL. It will then check if the VC Issuer is listed in this DNS named trust list, and if so will tell the Verifier that the issuer is a trusted member of this trust scheme operated by this "DNS name". In this way it does not matter whether the issuer was telling the truth or not. The TRAIN API and the DNS Owner tells the verifier the truth.

So the DNS Train entry for https://data.gov.uk could also point to trust lists at

 * https://companies-house.gov.uk/
 * https://www.nhs.uk/ 

The idea is that we have trust lists pointing to further trust lists, which is relatively
easy to do with linked data.

> 
> Each entry in the trust list has a Service Type Identifier. This is a URL and the web page pointed to should contain the JSON schema (and @context) for the VCs that are issued for this Service Type. In this way the verifier can also find out which attributes the issuer is trusted to issue.

yes, so that sounds very much like what I am proposing.

> 
> All the verifier has to do is configure the DNS names of the trust scheme owners that it trusts. When it receives a VC, it extracts the asserted trust schemes made by the issuer in the ToU property, and calls the TRAIN API, passing it the ID of the issuer and the trust scheme it is a member of. The TRAIN API will then check if the VC Issuer is a member of this trust list, and if so return the Service Type URL to the Verifier, so that the verifier can validate that the attributes in the received VC match the schema for the Service Type.

I think that is similar to what I am proposing too at the logical level. 

> 
> Note that the TRAIN source code can be run by anyone, so there can be multiple distributed copies of this service running on the Internet, and verifiers only need to keep pointers to one or more of them to provide them with backup services (much like the dozen       or so root DNS name servers).

I wonder if we need to involve editing the DNS that much. 
For example the Certificate could also link directly to the entry in the trust list, or
a record at one of the registrars. That record can point up in the hierarchy to the local authority,
that is giving out the claims. 

I do think that a DNS-sec entry could be very useful to allow commercial web sites to point
to their company record on say companies-house, giving browsers rich information to
display when people first reach their web site, or when they click the about page,
and removing a whole type of class URL based phishing attacks.

Hope I have not got that too far wrong :-)

Henry

> 
> Kind regards
> 
> David
> 
> On 04/08/2021 22:59, Henry Story wrote:
>> 
>>> On 4. Aug 2021, at 23:33, Bob Wyman <bob@wyman.us>
>>>  wrote:
>>> 
>>> I think one of the points of Henry's post was that interpretation of a statement depends, at least in part, on knowing the specific legal context within which the statement is made. In focusing on domain names, I confused matters because we all know too much about them. The point is that we can't know all the data that every country's equivalent of Companies House might publish and we can't know which of the statements made are authoritative rather than simply repetitions of self-asserted information that should be further verified. Thus, any automated means is going to need some indication, for each legal context, of what statements are authoritative and which are not. Is that reasonable? If so, how would an automated means discover the differences?
>>> 
>> There are I am sure a number of ways of doing that. Before the VC group produced its work I would have tried
>> to think hard about doing this without using named graphs or signatures.  But why not use those, now that those
>> are established?
>> 
>> 
>>> How useful would it be to have the maker of a statement annotate it with a claim as to whether or not the statement was authoritative? If so, what would be the requirements for expressing such a claim of authority or its absence? (a meta-VC?) How could proof of authority be provided?
>>> 
>> I think that would be very useful.
>> 
>> A record for my company could be published in two graphs published as a single DataSet in JSON-LD
>> available using HTTP (and perhaps also in some archived form on a LinkedData blockchain)
>>  * one part signed by company house,
>>  * the other part may not require a signature at all, or be signed by my company somehow.
>> 
>> The Companies house WebID or DID would link to 
>> https://gov.uk/registries
>>  and that would 
>> link back to the digitized registrars on the UK territory. That two way link (chain) provides
>> the proof of authority for UK Citizens whose trust anchor is the UK.
>> 
>> French citizens on the other hand, would need another link in the chain of trust: namely one from
>>  
>> https://registres.gouv.fr/ to https://gov.uk/registries
>>  
>> 
>> That is: the WoN is a non-centralised (diplomatic) social network that allows agents from
>> different countries to be able to evaluate claims of authority across national boundaries,
>> and have some estimation of the legal spaces involved. 
>> 
>> Of course Legal systems don’t make illegal behavior impossible, they just provide means of
>> finding redress if such happen that is strong enough to encourage a default trusting behavior. 
>> 
>> Henry
>> 
>> 
>> 
>>> bob wyman
>>> 
>>> 
>>> On Wed, Aug 4, 2021 at 5:09 PM David Chadwick 
>>> <d.w.chadwick@verifiablecredentials.info>
>>>  wrote:
>>> 
>>> 
>>> On 04/08/2021 20:44, Bob Wyman wrote:
>>> 
>>>> David,
>>>> I don't doubt that mechanisms can be provided to validate all the statements that might be made by Companies House, I was just pointing out that for some stuff I would trust Companies House and for other statements they make I would take those statements as things I should validate elsewhere -- unless they could show me a VC that indicated that they had already done the validation with the appropriate third-party. What I need is a means to determine which statements by Companies House should be considered the "final word" and which are statements that should be investigated further, perhaps by seeking an EV PKC. 
>>>> 
>>>> Perhaps I'm reading Henry's stuff wrong, but it seems to me that he's talking about providing a means by which I can determine a site's position within a specific legal context, such as that of a country. Thus, using Henry's proposed ontology, I could discover that Companies House provides the function of "incorporating and dissolving limited companies" in the context of the UK legal system. That is useful. However, it seems to me that I then need to do a "reverse search" to figure out, given the UK legal environment, "Who is the authority for domains (or whatever) mentioned in Companies House statements?" If the answer is "Companies House," I'm done. But, if it isn't, I need to do more work.
>>>> 
>>> I am afraid you will need to do more work, because the scope of Companies House does not intersect with the scope of the DNS and IANA. In other words, there is no relationship between a DNS name and a company's legally registered name. This is what EV PKCs were designed to do, to bridge that gap.
>>> 
>>> Kind regards
>>> 
>>> David
>>> 
>>> 
>>>> Please accept my apologies in advance if this is a really dumb question. I'm trying to catch up.
>>>> 
>>>> bob wyman
>>>> 
>>>> On Wed, Aug 4, 2021 at 3:06 PM David Chadwick 
>>>> <d.w.chadwick@verifiablecredentials.info>
>>>>  wrote:
>>>> We have been working on this problem for a while now and we have a working solution. It involves VCs and EV PKCs. CAs already issue DV PKCs instantly because the applicant can prove ownership of the DNS name, but it stops there. For EV PKCs you need to provide paper documents and perhaps answer telephone enquiries to prove ownership of the company name as well. In our working demo, a CA will instantly issue an EV PKC to an applicant if the applicant can provide VCs to prove its details from Companies House, its bank account details from a bank, its director's passport details etc. Of course, these VCs are not yet available from these issuers, but if they were, of if we had a trusted attribute attestation service instead that the CA trust, then we could issue EV PKCs instantly and the applicant organisation could prove ownership of the DNS name and the Company name using existing trust infrastructures
>>>> 
>>>> Kind regards
>>>> 
>>>> David
>>>> 
>>>> On 04/08/2021 19:38, Bob Wyman wrote:
>>>> 
>>>>> Henry,
>>>>> In your example blog post, Stopping (https) phishing, it seems that one could reasonably assume that companieshouse.gov.uk is a reliable authority concerning much about UK limited companies. Given a to-be-defined, ontology, etc. I understand how my browser might come to accept that. However, it isn't obvious to me that I should trust all that companieshouse.gov.uk has to say about UK limited companies. For instance, in your example, you have:
>>>>> "company_name": "CO-OPERATING SYSTEMS LTD.",
>>>>> 
>>>>>   "date_of_creation": "2015-12-17",
>>>>> 
>>>>>   "domain": ["co-operating.systems","
>>>>> www.co-operating.systems
>>>>> "], 
>>>>> 
>>>>> While I might trust this site's statement about the company name and date of creation, because their purpose is to "incorporate and dissolve limited companies" (a function that exists in many legal systems and thus something that could be usefully named.), why would I trust statements they make in their role of "register[ing] company information and mak[ing] it available to the public?" It seems to me that much of that data may be self-assertions by the registered companies and may not have been verified by anyone. For instance, unless they operate domain registries, why would I believe statements about what domains are owned, operated, or controlled by a company in their lists?
>>>>> 
>>>>> It seems to me that I need a way to discover not only the legal provenance and role of companieshouse.gov.uk but also some means to distinguish which of its claims can be considered authoritative and which cannot. Is this reasonable?
>>>>> 
>>>>> bob wyman
>>>>> 
>>>>> 
>>>>> On Wed, Aug 4, 2021 at 11:56 AM Henry Story 
>>>>> <henry.story@gmail.com>
>>>>>  wrote:
>>>>> Hi all,
>>>>> 
>>>>> There is a need for a global, decentralised, geopolitically relevant trust system
>>>>> that reflects international law. It is not technically difficult to do, all the
>>>>> pieces are in place, and it is needed for a lot more than Verifiable Claims.
>>>>> 
>>>>> I wrote this up a couple of years ago as part of my 2nd year PhD 
>>>>> report (on hold  as I ran out of money), and summarized it in this PDF.
>>>>> It’s a real simple application of linked data
>>>>> 
>>>>> 
>>>>> https://co-operating.systems/2020/06/01/WoN.pdf
>>>>> 
>>>>> 
>>>>> I have not had time to translate that doc to HTML, but  it actually points to 
>>>>> a number of earlier blog posts all in HTML. For example this blog post
>>>>> describing 13 use cases
>>>>> 
>>>>> 
>>>>> https://medium.com/@bblfish/use-cases-for-the-web-of-nations-361c24d5eaee
>>>>> 
>>>>> 
>>>>> Perhaps that can be brought into the consultation process?
>>>>> 
>>>>> Henry
>>>>> 
>>>>> 
>>>>> 
>>>>>> On 4. Aug 2021, at 17:30, David Chadwick <d.w.chadwick@verifiablecredentials.info>
>>>>>>  wrote:
>>>>>> 
>>>>>> All verifiers should be able to be configured with Issuers that they trust. So configuring with *.gov.country should be a viable option for a verifier. In this case a trust list is not needed because you already know your trusted issuers.
>>>>>> 
>>>>>> If you want to have a trust chain that goes from gov.country to unknown.issuer to holder.vc that is also fine because you an unbroken chain of trust, effectively with delegation of authority from gov.country to the unknown.issuer. But this is somewhat different to an attribute attestation service. Its an issuer attestation service (regardless of the attributes the unknown.issuer asserts). So lets not mix up concepts.
>>>>>> 
>>>>>> Kind regards
>>>>>> 
>>>>>> David
>>>>>> 
>>>>>> On 04/08/2021 10:06, Steve Capell wrote:
>>>>>> 
>>>>>>> Not sure that you need a published trust list in all cases.  As you suggest, if both issuer and attestation provider are equivalently “unknown” then there’s little value.  But that’s rarely the case.  The whole point of attestations is that they are made by rusted parties.  For example 
>>>>>>> - a national health authority attests to the accreditation status of an otherwise unknown clinic that issues a vaccination cert
>>>>>>> - a customs authority attests to the business identity and trusted trader status of an otherwise unknown issuer of a declaration of origin 
>>>>>>> - and so on 
>>>>>>> 
>>>>>>> In these cases I really only care that the attestation comes from *.gov.au or *.gov.uk . I Don’t really need a list to check that Australia or the United Kingdom governments exist or to decide whether to trust them - do I?
>>>>>>> 
>>>>>>> Steven Capell
>>>>>>> Mob: 0410 437854
>>>>>>> 
>>>>>>> 
>>>>>>>> On 4 Aug 2021, at 6:43 pm, David Chadwick <d.w.chadwick@verifiablecredentials.info>
>>>>>>>>  wrote:
>>>>>>>> 
>>>>>>>> 
>>>>>>>> Hi Luca
>>>>>>>> 
>>>>>>>> This makes more sense. Simplify is more correct than shorten. But it is still a spurious argument.
>>>>>>>> 
>>>>>>>> This is because you are comparing apples and oranges. You are saying that if we get an issuer we don't recognise then it is complex to resolve this, so the holder should replace the issuer with an attribute attestation service that we do recognise. But what if you don't recognise the attribute attestation service that the holder has used to replace the issuer (e.g. one from Somewherestan). You have solved nothing. An unknown issuer and an unknown attribute attestation service are just as value-less, whilst a known issuer and a known attribute attestation service may be just as valuable to the RP.
>>>>>>>> 
>>>>>>>> So using an attribute attestation service is only of value if the RP (or EU) publishes the list of trusted issuers (which can include genuine issuers and attribute attestation services, as the two are indistinguishable from a trust perspective (unless the trust list describes the differences)) and tells the users that they must get VCs from issuers in this trusted list otherwise the RP wont be able to interact with them.
>>>>>>>> 
>>>>>>>> I think your comment really boils down to the fact that trust lists are really needed (which is exactly what the TRAIN project has produced, as part of eSSIF-lab).
>>>>>>>> 
>>>>>>>> Kind regards
>>>>>>>> 
>>>>>>>> David
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 
>>>>>>>> On 03/08/2021 07:21, Luca Boldrin wrote:
>>>>>>>> 
>>>>>>>>> Correct, Steve.
>>>>>>>>> In general, “shorten” should perhaps be replaced with “simplify”. 
>>>>>>>>> Indeed, validating a credential issued by an unknown issuer requires a complex process of gathering information about that issuer (when available), and taking risk-based decisions.
>>>>>>>>> In the “qualified attribute attestation” model you just check that the attester is listed in the EU trust list, liability is clear.
>>>>>>>>> The model has drawbacks as well…
>>>>>>>>> Best,
>>>>>>>>>  
>>>>>>>>> --luca
>>>>>>>>>  
>>>>>>>>>  
>>>>>>>>>  
>>>>>>>>> Da: Steve Capell 
>>>>>>>>> <steve.capell@gmail.com>
>>>>>>>>>  
>>>>>>>>> Inviato: martedì 3 agosto 2021 02:28
>>>>>>>>> A: David Chadwick 
>>>>>>>>> <d.w.chadwick@verifiablecredentials.info>
>>>>>>>>> 
>>>>>>>>> Cc: 
>>>>>>>>> public-credentials@w3.org
>>>>>>>>> 
>>>>>>>>> Oggetto: Re: Public consultation on EU digital principles
>>>>>>>>>  
>>>>>>>>> ATTENZIONE: Questa e-mail proviene dall'esterno dell'organizzazione. Non cliccare sui link o aprire gli allegati a meno che tu non riconosca il mittente e sappia che il contenuto è sicuro.
>>>>>>>>> I assumed that it meant a shorter trust chain from the verifier perspective  
>>>>>>>>>  
>>>>>>>>> For example 
>>>>>>>>> - option 1: clinic issues covid cert to subject.  Health authority issues accreditation cert to clinic.  There is some kind of hash link connection from covid vax cert to clinic accreditation cert.  verifier must follow links and verify both
>>>>>>>>> - option 2: clinic does covid jab and requests certificate issuing directly from national authority
>>>>>>>>> (Oracle as issuer pattern).  Verifier just verified the one cert and trusts the national authority 
>>>>>>>>> 
>>>>>>>>> Steven Capell 
>>>>>>>>> Mob: 0410 437854
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> On 3 Aug 2021, at 6:11 am, David Chadwick 
>>>>>>>>> <d.w.chadwick@verifiablecredentials.info>
>>>>>>>>>  wrote:
>>>>>>>>> 
>>>>>>>>>  
>>>>>>>>> Hi Luca
>>>>>>>>> 
>>>>>>>>> I am interested to know how the introduction of an attribute attestation service, presumably between the issuer and holder, can shorten the trust chain. One would have thought that it would do the opposite
>>>>>>>>> 
>>>>>>>>> Kind regards
>>>>>>>>> 
>>>>>>>>> David
>>>>>>>>> 
>>>>>>>>> On 02/08/2021 17:43, Luca Boldrin wrote:
>>>>>>>>> Hi Manu,
>>>>>>>>> the consultation is an online survey that anyone can fill in. In parallel the EU Commisison is conducting many one-to-one discussions with different stakeholders.
>>>>>>>>> One of the most relevant aspects under discussion is probably related to “attribute attestation service”, which is a trusted third party acting on behalf of the issuer (to shorten the trust chain):
>>>>>>>>> <image002.jpg>
>>>>>>>>> (from 
>>>>>>>>> https://ec.europa.eu/newsroom/dae/redirection/document/76608
>>>>>>>>> )
>>>>>>>>>  
>>>>>>>>> I would appreciate any views on that.
>>>>>>>>> Best,
>>>>>>>>> --luca
>>>>>>>>>  
>>>>>>>>>  
>>>>>>>>> Da: Snorre Lothar von Gohren Edwin 
>>>>>>>>> <snorre@diwala.io>
>>>>>>>>>  
>>>>>>>>> Inviato: lunedì 2 agosto 2021 15:00
>>>>>>>>> A: Manu Sporny 
>>>>>>>>> <msporny@digitalbazaar.com>
>>>>>>>>> 
>>>>>>>>> Cc: W3C Credentials CG 
>>>>>>>>> <public-credentials@w3.org>
>>>>>>>>> 
>>>>>>>>> Oggetto: Re: Public consultation on EU digital principles
>>>>>>>>>  
>>>>>>>>> ATTENZIONE: Questa e-mail proviene dall'esterno dell'organizzazione. Non cliccare sui link o aprire gli allegati a meno che tu non riconosca il mittente e sappia che il contenuto è sicuro.
>>>>>>>>> Has anyone attended these or done any consultation? 
>>>>>>>>> Any specific parts that was addressed?
>>>>>>>>> ᐧ
>>>>>>>>>  
>>>>>>>>> On Thu, Jul 8, 2021 at 4:18 PM Manu Sporny 
>>>>>>>>> <msporny@digitalbazaar.com>
>>>>>>>>>  wrote:
>>>>>>>>> For those that don't know about it yet, the EU has opened a consultation,
>>>>>>>>> running through Sept 2021, to get input on future EU digital principles. Folks
>>>>>>>>> that have an opinion (I expect many in this group) may want to join and
>>>>>>>>> provide input.
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> https://digital-strategy.ec.europa.eu/en/news/europes-digital-decade-commission-launches-consultation-and-discussion-eu-digital-principles
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> -- manu
>>>>>>>>> 
>>>>>>>>> -- 
>>>>>>>>> Manu Sporny - 
>>>>>>>>> https://www.linkedin.com/in/manusporny/
>>>>>>>>> 
>>>>>>>>> Founder/CEO - Digital Bazaar, Inc.
>>>>>>>>> News: Digital Bazaar Announces New Case Studies (2021)
>>>>>>>>> 
>>>>>>>>> https://www.digitalbazaar.com/
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>>  
>>>>>>>>> -- 
>>>>>>>>> Snorre Lothar von Gohren Edwin
>>>>>>>>> Co-Founder & CTO, Diwala
>>>>>>>>> +47 411 611 94
>>>>>>>>> 
>>>>>>>>> www.diwala.io
>>>>> 

Received on Tuesday, 10 August 2021 09:23:22 UTC