- From: <meetings@w3c-ccg.org>
- Date: Tue, 5 Aug 2025 15:26:16 -0700
- To: public-credentials@w3.org
- Message-ID: <CA+ChqYeHHrZXNV+6ncL=2MwXmTn5FLTdDKR-VBndfZE7Z4fQJw@mail.gmail.com>
W3C CCG Meeting Summary - 2025/08/05 *Topics Covered:* - *No Phone Home Principle:* The primary focus was a discussion on the "no phone home" principle within decentralized identity systems. This principle advocates against systems where credentials must contact the issuing authority ("phone home") for verification, emphasizing its conflict with decentralized identity's core tenets. - *Mobile Driver's License (MDL) and Server Retrieval:* The discussion centered heavily on the MDL specification and its "server retrieval" method. This method allows verifiers to contact the issuer for validation, raising significant privacy concerns due to potential tracking of user interactions and locations. The presenters showed how this was implemented in Utah, causing alarm and a subsequent shutdown, highlighting the lack of awareness and control among implementers and the potential for misuse. - *ISO 18013-5 Specification Analysis:* A detailed analysis of the ISO 18013-5 specification revealed that while server retrieval is technically optional, it's often practically mandatory due to interoperability concerns and vendor incentives. The specification's use of terms like "recommended" was highlighted as potentially misleading. - *Cross-Jurisdictional Issues and Interoperability:* The challenges of cross-jurisdictional interoperability were discussed. If one jurisdiction disables server retrieval, it can break interoperability with other jurisdictions that utilize it, creating a dilemma for privacy protection versus interoperability. - *Technical and Sociopolitical Alternatives:* Technical alternatives were discussed, such as verifiable credentials with proof of non-revocation and oblivious HTTP. Sociopolitical alternatives, such as policy changes and legislation, were also considered, but their fragility and dependence on political climate were noted. - *Community Consensus and Future Actions:* Strong community support for the "no phone home" principle was evident. Concerns were raised about the mischaracterization of the issue by some MDL implementers. The meeting concluded with a call to action to promote better defaults, clarify the implications of optional features, and push for improved standards and community advocacy on baseline privacy protections. *Key Points:* - Server retrieval in MDLs enables tracking of user activities and locations. - The ISO 18013-5 specification's language regarding optional features (like server retrieval) is misleading; in practice, it's often required for interoperability. - Utah's experience revealed implementation of server retrieval without sufficient understanding of its privacy implications. - The "no phone home" principle is fundamental to decentralized identity and should be a priority. - While enterprise use cases might benefit from phone home, this must be balanced against the broader privacy implications for citizens. Alternative designs are needed to appropriately address the needs of both. - The community needs to push for better standards and defaults to prevent the erosion of privacy protections. Text: https://meet.w3c-ccg.org/archives/w3c-ccg-ccg-weekly-2025-08-05.md Video: https://meet.w3c-ccg.org/archives/w3c-ccg-ccg-weekly-2025-08-05.mp4 *CCG Weekly - 2025/08/05 11:51 EDT - Transcript* *Attendees* Alan Karp, Alex Higuera, Benjamin Young, Chandima Cumaranatunge, Dave Longley, Dmitri Zagidulin, Elaine Wooton, Erica Connell, Fireflies.ai Notetaker Ivan, Geun-Hyung Kim, Greg Bernstein, Gregory Natran, Harrison Tang, Hiroyuki Sano, Ivan Dzheferov, James Chartrand, Jay Stanley, JeffO - HumanOS, Jennie Meier, Joe Andrieu, Kaliya Identity Woman, Kayode Ezike, Ken Griggs, Kerri Lemoie, Kim Hamilton Duffy, Mahmoud Alkhraishi, Manu Sporny, Nick Ris, Otto Mora, Parth Bhatt, Pavol Hrina, Peter Bachman, Phillip Long, Rashmi Siravara, Sharon Leu, Steven McCown, Ted Thibodeau Jr, Timothy Ruff, Vanessa Xu, Venu Reddy, Will Abramson *Transcript* Phillip Long: Good morning, Harrison. Harrison Tang: Good morning. Hello everyone. Alan Karp: I see a lot of The gray beards join earlier. Is that the convention here? Ted Thibodeau Jr: Did you not get the memo? Alan Karp: I joined early so without the memo. Ted Thibodeau Jr: Rebeard psychic superpowers. Alan Karp: You caught me. Harrison Tang: All right, we'll start in about two minutes, but Thanks everyone for jumping on time. So, let's give everyone else about a minute and we'll start right away. Harrison Tang: All right, we'll start this week's W3CC meeting. so today we're very excited to have Kim, Joe, and Steve here to lead a discussion on no phone call home. so this is likely the most controversial topic in the last 12 month. so this is going to be a very exciting discussion. Now just a quick reminder on the code of ethics and professional conduct. Harrison Tang: just want to make sure we hold respectful constructive conversations let's make sure that we assume good intentions from everyone we might have different perspectives but I think we all coming from a good place right there could be different context for different solutions and different designs let's make sure that we keep dialing our goal is to figure out why in some situations to walk. So I think we have been holding very great conversations in the past two three years and let's make sure we continue to do that. a quick note on the international property anyone can participate in these calls however all substances to the CCG work items must be member of the CCG with full IP. Harrison Tang: It's actually quite easy to do that. If you have any questions about getting the W3C account or the contractor license agreement, please feel free to reach out to me or any of the coaches. These calls are being automatically recorded and trans So you'll the transcription, the video, and the audio recording will be automatically sent out in the next 24 hours. let's take a quick moment for the introductions and re reintroductions. So I see a lot of new faces. if you want to just introduce yourself feel free to just unmute. I'm not going to call on people. Harrison Tang: Let's get to any announcements reminders. we have a pretty full agenda for the next few months. So, if you want to preview what's coming, here's the link to the W3C CCG calendar. Just a quick note. it's not just the CCG calls. There's also VCAP. Wednesdays there's incubation and promotion of different work items. Fridays there's data integrity and then there's VCU. So all the dates actually in this calendar. So feel free to just go to the link and then take so next week we will have Drummond to actually talk about the first person personhood credentials project. 00:05:00 Harrison Tang: Yeah. All right, Kia. Thanks. Kaliya Identity Woman: I just want to say that IW's coming up October 28th to 30th in Mountain View, So, everybody's invited. Should be really great. Harrison Tang: Thank you. Any other announcements reminders? Yes. Timothy Ruff: I'll make an announcement real quick. U you able to hear me? So, the state of Utah is not publicized this yet, but they're going to be hosting an event for SETIC SEDI, which is state endorsed decentralized identity for policy makers on Friday, October 17th, and the day before for the general tech industry. so anybody here who'd want to come and it'll be held at Utah Valley University on Thursday the 16th and for policy makers only on Friday the 17th. Harrison Tang: Thank Thanks. Any other announcements any updates or questions on the CCG work items? As so we just had a great quarter two review of boards which were 15. We have since adopted two new work items and we will review that again September 30. So about three months. All right. Last calls for ductions, reintroductions, announcements, reminders for guidance. All right, let's get to the main agenda. Harrison Tang: So again very excited to have Joe and Steve here to lead a discussion on no phone home. as most of us know but I think this might be new to some people is that a phone home is basically a mechanism where ing when the data the holders are presenting the credentials to the verifiers the credentials will actually phone home or actually connect to the issuers. Harrison Tang: so there could be some advantages but at the same time obviously it could enable some kind of surveillance. so that's what phone home is. I'm pretty sure Kim and others will actually describe what it is for people who are new to the topic. But this is a very interesting discussion. We had couple long threads about it. so I think this is going to be a great conversation and Kim please take it away. Kim Hamilton Duffy: Thank you and thanks for inviting us. And the principle of no phone home has been pretty fundamental to the credentials community group since the beginning. In fact we have a slide that shows how it's called out as a specific goal in the verify credential data model use cases. So, we're excited to share details here and I invited some of basically the collaborators behind No Phone Home and very happy that they've all joined us today and we will take turns presenting some slides but we plan to leave plenty of time at the end for Q\&A. So, I'll turn over first to Timothy Ruff to get us started. Timothy Ruff: Thanks, And thank you everyone. the statement that's on your screen, I imagine each of you have seen it's fairly simple. It just basically says that we don't want policy makers to implement systems that phone home and describes very simply what that means. We don't want an identity system to be interacting with checking back with the original issuing authority. and it's unnecessary. Frankly, the whole decentralized identity industry exists to get around this problem. And you can't have decentralized identity if every time an identity is verified, it has to phone home to some authority. So, it is actually at its foundationally antithetical to the whole concept of decentralized identity. And just a little bit of background on how we got started. 00:10:00 Timothy Ruff: Kim at IIW walked up to me during the dinner time and she had her plate and I was at a table and she came sat next she said maybe it's just you and me anymore kind of frustrated and we were commiserating a little bit about the prevalence of phone home systems and the lack of concern about the privacy implications and it seemed like just kind of a gradual erosion of decentral centralized identity principles. And so while we were commiserating, we recruited Steve Macau, Joe Andrew, and Jay Stanley to host a session the next morning and to repeat some of the things that Steve Macau had already been presenting that he found with the MDL. And it was wellreceived and there was a lot of certainly controversial with some, but well received by others, very polarizing in we think a helpful way. Timothy Ruff: And then we decided after IIW that we would create a statement and get some signers and that was led by Jay Stanley with the ACLU. And once the ACLU started throwing their weight around then it really got serious. So that's kind of the gestation of this. Go ahead and go to the next slide. so this just shows what Kim was just mentioning that this is a bedrock principle of this community to avoid phone home. And if you think about it, you can't have decentralized identity if the identity system has to phone home to some authority that it literally is antithetical to the whole concept. So it should be shunned like the plague by everyone in this community in my opinion. I'm speaking very very strongly opinionated certainly happy to hear someone disagree with that but it seems antithetical to me. go to the next slide and this is the last slide I was going to cover. A little bit of background. Timothy Ruff: Steve Macau who's going to be taking over right after me on the next slide presented basically the text of the ISO 18013 5 spec where it talks about the server retrieval elements and he brought receipts and it's interesting because the ISO way of developing standards is not an open standard system I mean you can call it an open standard Timothy Ruff: but not most people have purchased it. You have to buy it to get the exact text of it and know what's in it. So, he Kim bought it, I bought it. we looked at the text and Steve took some screenshots, had created a presentation at IW where he basically showed us the smoking gun. And he's going to show all of you here in a moment what we saw. And the smoking gun meaning here's what server retrieval does inside of the mobile driver's license. And it's not just the MDL. the statement is general. Timothy Ruff: It's about any system that does phone home. but the MDL has a lot of momentum. It's being adopted in a lot of places and I'm summarizing the points on this slide here. but the reason we focused on the MDL is because it has a lot of momentum and it is being implemented and we discovered in my home state of Utah, it says a US state, it's Utah. and maybe this happened in another state as well, but I know this happened in Utah that they did not understand what they had done. Timothy Ruff: They didn't understand what server retrieval was doing and what it was capable of. and they frankly didn't even know that it was happening. It was just a recommended implementation. It was implemented that way. And as soon as Utah became aware of what was happening, they turned it off and were alarmed. And now we're campaigning against it. And so there's going to be some serious push back from the state of Utah on the mobile driver's license as a result. So, I'm going to stop there, hand it over to Steve. He's got some receipts to share. And u Thank you, Steve. Steven McCown: I'm happy to be here today. Thank you for the opportunity. as Timothy mentioned, that's kind of the genesis of how this came about. from my personal backstory. in a previous occupation, I worked as a red team vulnerability researcher where I would look for things that could be misused. And so a lot of times we build software with the intent of how does this accomplish whatever goal we're attempting. And that occupation for me has forever changed my mindset into how could somebody misuse the good things that we've created? And the MDL has some really cool aspects to it. 00:15:00 Steven McCown: but they have these others that I think draw away from that quite a bit. So yeah a couple of us gave a talk at IAW last and it was hurried together because of the opportunity to do so. And so if you go look at you can see all the slides there in the IDW proceedings or on that link that's on the page. They're pretty rough. So, we're trying to clean this up some of it a little bit. so let's go on to the next slide. I know you're all technical and you're probably very familiar with this, so I'll not go into too much detail about how things work and I'll limit my comments to what we observed and how it might cause a problem. Steven McCown: So with the MDL, it's kind of the issuer holder verifier model that we've all talked about. but the part that really got our attention was that there are two methods of retrieving your license data. And so the first one is device retrieval. And that looks very much like self- sovereign digital identity, whatever you want to call where we use that issuer holder verifier model and we like that it works pretty good. Steven McCown: but as Timothy mentioned a lot of states particularly here in Utah we found that it had been implemented using server retrieval. And in a nutshell what that means is that the holder has a credential that they will provide to the verifier. And in the case of device retrieval, the information is contained within the data the holder possesses. Whereas in server retrieval, it is contained back at the issuing server. And so the verifier needs to call the issuing server, thus phone home, and say, okay, I just got this particular MDL expressed to me. is it valid? What other information do I need? Steven McCown: and all that kind of stuff. And so the act of contacting the issuer each and every time a credential is verified creates a situation where a user's interactions and locations and purposes can be tracked by the issuer. All right, next slide. So, we like the three-party traditional SSI model. but this kind of makes it in a way kind of the three and a party kind of a four-party by phoning home back to the issuer. Steven McCown: And what happens is good cyber security policy will say that all computer accesses need to be logged and they need to be logged for a period of time and that is totally dependent upon the server owner operator how that's done but it gives them the opportunity to say Joe went to the gas station and bought this or expressed their credential in order to do something at the department of motor vehicles or to get a fishing license or any of those types of things. And with Apple's announcement about MDLs at WWDC here a little bit ago, the intent is to take MDLs and make them available to use as web authentication and web login. Steven McCown: So the concerns that we've had about maybe the state know when somebody buys alcoholic beverages or does something with their fishing license or whatever traditional things MDL is intended for. By coupling it with the web, we've now created a situation where the logging can expand dramatically to anything we do and wherever we go online. And I know that that wasn't intended, but that's kind of what happens when these capabilities are available and they just kind of evolve and they go just move forward. Somebody says, " I need an identity system for my website." And this is a good one. Let me piggyback on that. and that's how these things kind of evolve. 00:20:00 Steven McCown: one of the things that we found according to the specification and this is highlighted more in the other slides that are on the bottom of the page is that a state can change from device retrieval to server retrieval without knowing notifying anyone. And what happens is when an issuer makes that change to go from device retrieval to server retrieval, what happens is there's notifications sent out to each of the holders and they need to launch whatever wallet app state driver's license app that they're using and then magic will happen. Steven McCown: the protocol will take over, a new slide will or a new credential will be downloaded from the issuer and so forth. And we saw that in Utah because as Timothy mentioned, we found that Utah had implemented his server retrieval. And once we explained what that was and that it wasn't necessary, they immediately turned that off. And so that caused a kind of a cascade of every credential that had been issued to be to have an update request that holders needed to service. And they didn't really need to know what they were doing, just that there was an update and the text message that came out said, "There's an update to your end deal. Please launch your app and it'll be updated." And so it can change. Steven McCown: going beyond that, we found that it wasn't just that the state itself could change everybody's MDLs, but they could be targeted to specific individuals and only certain MDLs could be updated from device retrieval to server retrieval capability. And so with all the tracking and the logging that I just mentioned, this could be focused on a very particular individual. maybe somebody has a reason to be a person of interest. Maybe they have political leanings that are different than the prevailing authority. Whatever the case may be, we found that it could be very targeted to specific individuals. all right. Steven McCown: so one more thing that we found here in the state of Utah is that the interoperability portion of the MDLs which is really cool by the way it's really helpful but what it does is it means if our state for example turns off divi server retrieval because we have a different view on how privacy might need to be maintained. what happens when someone comes from a different jurisdiction. Steven McCown: it could be a different state, different country and presents their MDL using server retrieval if that's how it was created out at one of the venues here in the state, then that venue ends up taking participation in the surveillance or phoning home activities of the other state's resident as they move around and do things here in our state. And so that's one of the problems. Now that one cannot be turned off. if you disable server retrieval for externally issued credentials then what happens is you just break interoperability there. There's not like a halfway in between. Steven McCown: So if somebody comes presenting a credential with server retrieval then you either accept it or you don't and you have interoperability or you don't and so some states in particular ours don't really want to participate in phone home type surveillance to those other issuers even though that's the way the specification needs to operate. All right. Steven McCown: go ahead. Next slide. so what we found, so this is a little bit different and you can take a look in the spec, but basically there's a bunch of things in the spec that say they're accepting things that are optional, it really is optional. You don't have to accept them, but there's some downsides. for example, verification terminals. it is optional whether they support server retrieval or not. The problem is in order to be compliant with the standard they kind of need to put that in there. I mean who wants to go to their boss and say we just worked for a year and a half. We created this expensive piece of hardware we want to sell to do MDL verification and because of privacy reasons we eliminated server retrieval. 00:25:00 Steven McCown: Therefore, now we're not interoperable with anybody. that would be a career or at least that job killer. because you don't want to go to your boss and say, we just made ourselves uninteropable with other credentials from other venues. So, yeah, a lot of times it says in the spec certain things are optional, and we found that to be practically not the case, even though it was technically still true. next slide. All right. yeah. And here's another view. this is one that Kim found in the spec where if you look in the matrix here down the left hand side, you see server first you see device retrieval and then you go over to under support where it says MDL reader. Steven McCown: device retrieval items are mandatory other than Wi-Fi, but when you get to server retrieval, they're recommended. And that's one of those cases. what really does recommended mean? and so there's some confusion there. And this is what happened in our state. our state had no desire to create data logs of all MDL uses but because it followed the specification and set up their systems according to the recommendations that's what they had created and once we did some analysis figured out that that was what had happened we talked to the state and they by themselves went and turned that off and deleted all the logs that had been recorded. Steven McCown: but that's whether it's optional, mandatory, recommended, conditional even are kind of a little bit misleading. So next slide. So yeah, the real question there's a couple of questions that we've found are important to ask. Will the r issue By that what we mean is will the issuer use server retrieval or will they not and how will using so what happens is the credential that's contained in the wallet on the phone actually has some data elements in there that tell the verifier terminal when a credential is expressed that credential is using server retrieval or device retrieval. Steven McCown: So using, cyber security tools, you can peek into the sandbox of another app. Yeah, it's hard, but you can do it and you can figure out what your credential is using, but most people don't have that capability. And unless the wallet provider has decided to say, hey, you're using device retrieval or you're using server retrieval, which would probably just confuse most people, then it's really kind of an unknown. And as we demonstrated here in Utah, you can turn one mode off and enable the other mode and all anyone ever sees is that there's an update and it doesn't have to explain what the update is. on the reader side, yeah, I think readers kind of are in a bind where they have to implement both modes or their value proposition is not being interoperable, which would probably very much limit sales. Steven McCown: So even though it's called recommended and optional, it's effectively, from a financial perspective, it's not. and so yeah, this last question is kind of a brainstorming question of what other things have now that we have server retrieval and everything that gets recorded, what else can we do with that? So that's things like when the verifier terminal phones home, they're going to use TCP IP traffic just like anything else. And what that will do is it will reveal their IP address, which is probably already known somewhere, but that can be turned into g GPS coordinates. Steven McCown: the NSA has a patent on how to do that and that's been around for kind of a long time. but any of those things that happen, any other data that might be solicited, it can all kind of be recorded. And the bottom line here is even though these things are optional, if it exists, somebody's going to find a reason to turn it on. I mean, if we followed Apple's method and we used MDL to get onto a website, in another previous occupation, I helped stream the very first, geographically sandboxed Major League Baseball team in the United States. 00:30:00 Steven McCown: and so what we did is we tried to limit distribution of the viewing of that game by geographic location and so that's something that you never know there's all sorts of other information and so the act of phoning home isn't just for information that's in the MDL specification. it's for things that can be derived from that specification. So, that was kind of a lot and I didn't read all the questions while we were doing this. do we want to talk about any of those questions right now or kind of wait till the end? Kim Hamilton Duffy: And one quick point I'm going to make is that I'm going to edit bullet point number three to say what else can the issuer learn with or without the user's consent and will there are some interesting questions here I think in the ISO specifically issues of consent and there are all kinds of kind of murkier notions of consent in there like preconsent and then consent based on proximity that I think would need to be teased apart because I think that they're not necessarily obvious to implementers to users things like that. Kim Hamilton Duffy: There are a lot of tricky areas that will boil down to sort of jurisdictional requirements and we'll get to Phil to add some more nuances there. And I think let's leave questions to the end. we only have a few more slides. let's see. I think let me get back to this one. Kim Hamilton Duffy: Why is this different? So Steve, I had you covering this one. You want to finish us off with your part of the presentation? Steven McCown: Yeah. Steven McCown: So generally speaking, when it comes to privacy and surveillance, people don't really always know. they know they want to be provide private and they don't want to be surveiled, but they don't always know when that's happening or how it's happening. so that's incumbent upon us to create systems that are inherently privacy pro protecting and that are still very cryptographically secure and and so whenever there's data collected there will be a reason to use it later that maybe the designers didn't envision. Steven McCown: And so it's best to not create as many things that get logged. So that's it. Kim Hamilton Duffy: And sorry for the glitches. Kim Hamilton Duffy: I'm on a very big screen so just trying to get it to the right view. Thank you so much, Let's see. The more we thought about it, the Steve's point about the crossjurisdictional considerations in general introduced a lot of interesting and tricky questions. So, when you think about a driver's license at minimum, how often it's even used varies a lot based on where you live. So, in the US, we use it. ever since Steve's presentation, I think about my driver's license every time I use it, making note of, is someone scanning it? Are they just looking at it? did they even request it? And we use it often, all the time, and for non-driving purposes. In fact, I guess this is a good thing. Kim Hamilton Duffy: And lucky I was not getting pulled over by police or interacting with the police that often, but they were all non-driving purposes. So proving age when accessing an age restricted product is a common one in the US. Picking up a prescription, picking up a shipment. And so in some cases, as you know, if you use your driver's license, sometimes' the physical driver's license, sometimes they'll scan it. So that would result in sort of the logging potential tracking. But in many cases what I found was that people were just looking at it checking that the photo making sure it's me. No record was being made. Kim Hamilton Duffy: so that's just focusing on the US and there's variation within US states around which required barcode reading but some countries have a national ID in cases like the driver's license wouldn't even be used. So it's very interesting question around if you're talking about a latent surveillance risk if people are even using it and what you could potentially correlate depends greatly on where you live. So then the other factor that depends on where you live it are data protection. So in the US we have no comprehensive data protection framework like the GDPR. 00:35:00 Kim Hamilton Duffy: So many of the risks called out in the ISOspec I think it's appendix E that are sort of said implementers know that this is a risk deal make sure you deal with it in the case of many locations in the EU there would be some control for it or some requirement around what apps can and cannot do in the US we generally assume lowest common denominator unfortunately and that's again just focusing on locations that we often talk about in this forum. So how to deal with risks is left to implementers who may not understand implications. That's what's really interesting about the Utah case which we touched on. Kim Hamilton Duffy: As noted, the state of Utah did not want server retrieval, but in a series of totally reasonable technical decisions. the server retrieval was in fact the preferred implementation and it's because the implementers observed, server retrieval is more reliable and more efficient than using Bluetooth retrieval. So, let's just use that. And so that was a case where when the chief privacy officer of Utah learned that in fact the preferred implementation it was not very popular with the state and… Steven McCown: What's that? Kim Hamilton Duffy: they made quick actions to overturn that. but that was a really good case of ISO has appendix E that says here are all the risks. AMBA also has their guidance for US states for talking about in the US context for example or North American context. and then they call out risks and note that they have said for MDL implementers, they're now saying it's banned in the US. So that's a good move. It doesn't address the cross jurisdictional reader concern that Steve mentioned. Kim Hamilton Duffy: But in any case, this is a really good example of how the risks get punted to ultimately in the context of North America to the US states and did they meticulously read every appendix of every specification guideline etc that came in and I think as Steve points out implementers are sorry, incentivized to implement full spec. So, they want to make sure they're not ruled out of procurement. So, it's better for them if they say I check all the boxes and warnings shoved to appendices may not be clear to decision makers. Timothy, is there something you want to add here? you're muted. Timothy Ruff: I just wanted to be on the queue for when you're done. Kim Hamilton Duffy: we're getting close. so the other thing that's interesting is there are technical alternatives. That's what this group, when I started participating nine years ago. That's exactly why I joined. So we had a group of people that wanted to build towards a three-party model where issuers can continue to control the credential life cycle. They can revoke credentials while avoiding phone home. We saw that just towards the beginning in the VC use cases document. we've been in this community and beyond building the technical elements to avoid phone homes. Kim Hamilton Duffy: So the bitst string implementation in verifiable credentials, a nonredit which uses proof of non-revocation which avoids phoning home and technologies like oblivious HTTP. all of these have been developed to avoid these risks and so it brings up questions of why are these not being used and then even does the credential more pointed question does the credentials community group continue to stand by this principle? 00:40:00 Kim Hamilton Duffy: and does it need to help promote or improve alternatives? So that this question is why is this controversial? This is where I think when Timothy and I had that conversation it just felt like what's happening here? why are we compromising on this principle and many other principles of self-s sovereign identity that we felt were fundamental to the community from the beginning. so I want to tee up Phil to touch on sociopolitical alternatives. Kim Hamilton Duffy: Then we'll be at the end roughly in discussion. So Phil Phillip Long: Thank you. Phillip Long: And my followup is simply an underscore of what Steve and I believe Timothy have already said. And there are in fact policies that can be implemented that instruct implementers not to do server retrieval. We've heard that discussed. one can go further and make actual statutes or laws that are legislatively adopted. And in many states, there are avenues for public referenda which can make amendments to a state constitution, among other things, to make it even harder for a change to be made. The fear for all of those sociopolitical alternatives is that they're fragile and dependent on the environmental of polit policy climates in those instit in those states. Phillip Long: by virtue of who the leadership happens to be at the time. So you may have a whipssaw thing where different policies get implemented depending on who happens to get voted into office in a particular election and that doesn't help anyone. the last thing to say is simply that policy by the security by policy is among the weakest and least useful of the mechanisms to address this problem. even if it seems as though it might be helpful. And I think just that needs to be underscored because people will say, we agreed to do this and we put this pl rule in place and now we're done." And it fades the background and then someone switches it on because they have an interest in doing so and there's some policy change that's made or an amendment or alteration to it and you're back to where you started from without even knowing it. Phillip Long: So that is I think the important thing to remember as we go forward. ideally if it is pulled out of the ISO spec as rumor suggests it' be a great change. I was wondering whether or not a clone of this implementation that does pull it out, whether ISO agrees to it or not, is an alternative. So that there is actually code that just doesn't have that option in it, but everything else there that is in the ISO spec is retained that people potentially are interested in. Phillip Long: Maybe that's an option down the road, too. Thanks, Kim Hamilton Duffy: So I'll take this closing slide. Kim Hamilton Duffy: A key takeaway is optional is not neutral. I mean, this is something the community here has strived for years is, how do we make sure that we're getting a broader set of, society input into the specs that we're, designing? How do we make sure that we're designing for a range of contexts and the standards we set today will determine protections of tomorrow. So, we cannot build these in a vacuum. Kim Hamilton Duffy: So some open-ended questions include how can we push for better defaults and standards? How can we identify where optional is likely to become coercive in the case of implementers? And are there baseline protections that CCG should advocate? So I think we have a lot of discussion. I want to close it here for next steps. Thank you everyone. I'll call on Timothy and then turn back to the chairs to take questions from the audience. to the feet. Timothy Ruff: Yeah, I want to share what I think my colleagues who were behind the no phone home thing, Kim, Steve, Joe, and Jay would also say and go back to our statement and that is that we oppose phone home. We don't care who the offender is. We're talking a lot about the MDL. There's been some mention about connect or whether it's in Open ID VC or VP. it really doesn't matter. I don't care what spec it is. If it phones home, I don't like it. and I don't think it's conducive to what we're trying to do from a privacy standpoint or autonomy standpoint with decentralized identity. 00:45:00 Timothy Ruff: And so to Kalia's point in the comments, 100% we need to be accurate about phone home so we know which things to oppose. And if something doesn't phone home, it might have some other problem, but I don't want to inaccurately accusing of phoning home. But if Open ID VP or VC depends or expects an implementation of Open ID connect, which phones home inherently, then it's a problem and I would oppose it. So, it's nothing personal. We're not trying to get on the bandwagon or accuse. That's a very strong word. We're trying to be very fair about what phones home and what doesn't. And if it phones home, we don't like it. And if it doesn't, then it's fine. So, I want to be very fair and accurate about these things. And so, for future conversations, we're not having the full conversation about it's not part of today's presentation about other specs that might phone home. a little bit in the comments was addressed. Timothy Ruff: So, if there's going to be future conversation about these things, I would just encourage the group to be clear about what phones home and what doesn't and draw the line there. Harrison Tang: Mommy, please. Funny. Kim Hamilton Duffy: Thank you. Back to Harrison. Manu Sporny: Yeah, so first off, I really wanted to commend each of you for putting the no phone home statement together and rallying the community behind it and getting such strong support of it. I mean there, 40 people here today. I think that very much underscores that the community cares about this topic deeply and I think the vast majority of us agree with that statement. I meaning the phone home statement. So Kim, you had asked, does this community still believe that in that? I think that's why so many people are here in support. I went to the federal MDL day two weeks ago and this topic came up. Manu Sporny: In fact, it specifically came up. and I was pretty disheartened with the response from the individuals on the stage. This is publicly recorded. I haven't gotten the link right now to them, but I'll try to send them to the mailing list. But the response from those deploying MDL were statements like, "It is not true that server retrieval was ever implemented in the United States. It has never been implemented. and therefore the people that are making these accusations are not being truthful about server retrieval. That was one of the statements. The other statement was these are a bunch of paranoid people that are trying to sell their own solutions and for that reason this is just a paranoid response. Manu Sporny: and then the least u u u costic comment I heard was they are completely u misrepresenting what the specification it doesn't say to phone home in the way that they're saying and so on and so forth. So, the reason I'm saying this, I disagree with every single one of those statements, but that was the response at federal MDL day in Washington DC with everyone that's deploying MDLs. I do think the initiative has been very successful in raising awareness and I think they didn't have to cover it. They just did, mention it. So, I think that's a positive outcome. Manu Sporny: But I think that's the other concern that I have is that there are a number of us that have been saying this for years that have provided feedback for years. and it does look like this time it finally cause a change in the specification. but I am concerned about the continued mischaracterization of the core message. so I'm wondering what do we do about that? because I think it resonated among the people that care about this stuff and for the people deploying it, the other vendors, it was just blown off as this bunch of paranoid people just wanting to sell their own own thing. thoughts on that. Timothy Ruff: I'd like to say something about that. I don't care who is selling stuff that doesn't phone home. Whether it's my grandma, I Uncle Fred, I don't care. I want products that don't phone home. And so that is a complete red herring if someone's going to say, "Well, they're just selling another thing. it really comes down to does it phone home or not? that's what the statement is about. And if someone's going to make just a factually erroneous claim that Phone Home didn't exist, that's just simply wrong. It's disingenuous. And it speaks to the integrity of the people making those claims. 00:50:00 Kim Hamilton Duffy: I will add. go ahead. Steven McCown: And I'd like to follow on with that. Steven McCown: So, whoever made the comment that no US state ever implemented it that way? Utah did. and they followed the ex explanations in the specification and we know that because they had to turn it off and the CIO personally told me that and so from talking to others I understand that other US states have done the same thing and I say I don't think it was malicious in any way. Steven McCown: I don't think it was intended to be a surveillance, but the facts the fact that it was turned on was just people following the specification and that it could be misused. That's why we need to be concerned about that because hackers read the manual and then they figure out what else they can do. And it's like the old TV show MacGyver. That's who hackers are. They figure out what they have and what they can do with it. And so that's why phone home has been a concern for us. Kim Hamilton Duffy: And lastly, the disin how do you say ad hom attacks and they may not be as effective as they think they're being. In fact, it was exactly those kind of accusations. LinkedIn starting about a year ago when Timothy has been raising awareness about this for a while as has Jay etc. It was the responses like that saying, " what do you have to sell?" and things like that that made my spidey senses start tingling and why I started being suspicious about what's going on here. so yes, keep the attacks coming I guess. Harrison Tang: By the way, Stephen, earlier there's a question in regards to what other states are following kind of Utah steps. So what are the more specifically the state of Iowa how does different state implement the MDL? Harrison Tang: Do they include phone home? can you kind of share the stat kind of overall status of the land? Steven McCown: Yeah. … Steven McCown: which states specifically other than Utah? I can't really answer that directly. I have firsthand knowledge of what Utah had done and why they had done it, meaning they were just following the standard. and so I imagine most other states had done the same thing. a couple other states I'm not entirely sure on the name so I'm not going to name them but it was intentional that they wanted it that way. So, what in response to bringing this up at IAW, I asked a question of the AMVA presenter at EIC in Berlin a couple months ago and they had already talked about this and started the process for updating the AMVA recommendation to recommend or to require actually that no US state use this. Steven McCown: So, I think wherever it was that we were and we might have fun, kind of debating over that, AMA's done the right thing in this case and that they've turned that they've required that to be turned off, but that still doesn't eliminate the fact that there's a button. it's not really a button, might take days or weeks to actually implement, but effectively there's a button somewhere that can turn it back on. and… Harrison Tang: Thank you, Alan. Steven McCown: that's kind of what we're also pushing back against is the ability to turn it on, not just whether it's on. Alan Karp: Just a simple question. an enterprise has a legitimate need to know when its credentials are being used. does that mean that this standard is just not appropriate for that use case? Steven McCown: So, if I could answer that. so there's a couple of different, let me call them societies, if you will. your corporate society, you're employed by the corporation. they put tracking software on virus scanning among other things. They put a lot of things on quote unquote your laptop, because you work for them, you're at the behest of their venue. we don't see citizens of a government in the same light. So when it comes to what your government should or shouldn't do in regards to phone home versus what your corporation should do. those are kind of different scenarios. So if one standard services the enterprise standard better, that's awesome. 00:55:00 Steven McCown: But we need to be clear on when and how things are used and why. So because in the past I worked for the US government and we did a lot of things. We purchased a lot of software and hardware that's called commercial offtheshelf cuts. And the reason that all came about is we saw something that was working really good in the private sector. And we thought, let's modernize government and all of our processes and make it all work better. We'll use that. We'll save money versus, subcontracting for somebody to build a new piece of hardware with a bunch of new protocols. And so that's why this is kind of a problem. So yes, you're absolutely correct. would that be appropriate in an enterprise? Yeah, probably. Steven McCown: But as those specifications migrate across industries, each industry has a whole lot of diverse requirements. Yeah. Alan Karp: So the answer is it without phone home that the standard is not appropriate for that use case. Alan Karp: That's a fine answer. Harrison Tang: Bill, good. Harrison Tang: Thank you, Bill. I also Okay, you might be on mute. Phillip Long: Yeah, I am on mute and I was doing so because I was trying to remember what I put my hand up for. I think that there are examples of use cases where phone home is in fact potentially a safety issue and necessary. One of those was brought to my attention for people fighting forest fires and knowing exact location of where someone is at that point in time could be very valuable. so it's not that the idea is inherently wrong. Phillip Long: The question is it inherently wrong in the context of the implementation where the driver's license is used as a generic device for multiple purposes and there may be very valuable reasons why in one particular context it's helpful but as was Steve mentioned if it is in such the baseline by which any citizen using a phone with their driver's license can have it implemented and I'm particularly concerned about have it implemented with nothing on the individual screen to say that that's the method of verification at this point in time being requested. I would feel better if that was there. although like someone mentioned in chat requiring consent for every little thing you do often makes the consent a knee-jerk response as opposed to a thoughtful response. Phillip Long: so there are concerns about how much friction we really think the system should have in this context and when to impose it. But in this particular case I think knowing that there is an essential step for those places where it's a valuable thing to have. Harrison Tang: Great. Greg Bernstein: I may have come in a little bit late and I know Kim knows this issue the phone home kind of gives real time tracking unique identifiers in an ID gives us linkability and this ability to track just if the verifier is in collusion with whoever. Right? So, particularly in the states where my driver's license California, I have a driver's license number and a lot of time that's used as my unique identifier. Instead of a social security number, somebody will ask for my driver's license number. we don't have selective disclosure and we don't have unlinkability in MDL. Correct. Greg Bernstein: So, phone home is the worst because that's real time tracking, but we still have the potential for somebody tracking you. Correct. Kim Hamilton Duffy: Yeah, I can talk to what I know about it. So there is some hardcoded selected disclosure over 21 as a hardcoded claim, not like PBS plus kind of selected disclosure and if there's a server retrieval token the guidance and I forget how strong it is from the ISOspec is do not reuse the token. So the NDL would have to request it fresh every time. So I suppose that's intended to minimize verifier correlation but still the concern about if it's all going back to the issuer anyway who can build this graph and then potentially package resell it or if other kinds of correlation there's many methods about sort of your device itself that could be used to rebuild that picture. 01:00:00 Kim Hamilton Duffy: so the tlddr of that is basically I think that there were some nuances that sort of wink at those concepts but don't really pull it off in my view. Greg Bernstein: Thanks. Harrison Tang: All right, we're at time, but any last questions? And then as there's a lot of comments about OID4 BC kind of u designs. I'll try to get someone and invite someone for open ID to kind of lead the discussions on that. Right. Thank you Timothy and thanks everyone for attending today's great discussion. This continues to be a amazing topic. Steven McCown: Thanks everyone. Harrison Tang: So I'll try to line up more discussions on this topic in the future. But thank you. Thanks a lot. Have a good one. Bye. Meeting ended after 01:01:47 👋 *This editable transcript was computer generated and might contain errors. People can also change the text after it was created.*
Received on Tuesday, 5 August 2025 22:26:26 UTC