Overview of First Three #RWOT11 Papers

Our 11th Rebooting Web of Trust collaborative workshop recently finished in
The Hague. Our goal is always to gather together experts in their fields
and facilitate their creation of white papers that will help to advance the
goals of decentralized identity on the internet.

We've had three papers finalized from #RWOT11, and I wanted to summarize
them for folks here who might be interested:

VERIFIABLE ISSUERS & VERIFIERS
https://github.com/WebOfTrustInfo/rwot11-the-hague/blob/master/final-documents/verifiable-issuers-and-verifiers.pdf

by Manu Sporny, Oskar van Deventer, Isaac Henderson Johnson Jeyakumar,
Shigeya Suzuki, Konstantin Tsabolov, Line Kofoed, and Rieks Joosten

This paper attacks the old problem of "trusted registries". How do you know
who to trust as the issuers of credentials? It answers that by discussing
the creation of lists of both Verifiable Issuers and Verifiable Verifiers.
It's that latter issue that may be the most innovative, because a
Verifiable Verifier list can tell us what credentials someone should be
able to request. A police officer demands *all* of your credentials? The
Verifiable Verifiers List can automatically say no!

LINKING CREDENTIALS WITH DATA EXCHANGE AGREEMENTS THROUGH SECURED INCLUSIVE
INTERFACES
https://github.com/WebOfTrustInfo/rwot11-the-hague/blob/master/final-documents/data-exchange-agreements-with-oca.pdf

by Lal Chandran, Lotta Lundin, Fredrik Lindén, Philippe Page, Paul Knowles,
Víctor Martínez Jurado, and Andrew Slack

A review of the classic patient/prescription use case, but with a new look
at problems such as accessibility and cross-border jurisdictions. It also
outlines how the DEXA and OCA protocols can contribute to scalable solutions

TAKING OUT THE CRUD: FIVE FABULOUS DID ATTACKS
https://github.com/WebOfTrustInfo/rwot11-the-hague/blob/master/final-documents/taking-out-the-crud-five-fabulous-did-attacks.pdf

by Shannon Appelcline, Kate Sills, Carsten Stöcker, and Cihan Saglam

A discussion of the opaqueness of DID designs and a look at five specific
and interesting DID attacks based in the CRUD life cycle: The DID Creation
Switcheroo; The Poop-Emoji DID Doc; Don't Talk about Fight Club (unless you
want to compare DIDs); Harmer in the Dwell Latency Attack; and The
Dishonorable DID Deletion. (The last has already led to an update for
did:ethr).

There will be more papers coming out over the next months.

We plan our next collaborative workshop for Fall 2023, however we have not
finalized a location.

Sign up for the RWOT mailing list to gather with your peers, receive
announcements of papers, participate in our monthly online open office hours,
or get details about future workshops:

https://www.weboftrust.info/subscribe/


— Christopher Allen

Received on Friday, 23 December 2022 03:17:48 UTC