- From: Christopher Allen <ChristopherA@lifewithalacrity.com>
- Date: Wed, 13 Aug 2025 01:22:53 -0400
- To: Pryvit NZ <kyle@pryvit.tech>
- Cc: David Chadwick <d.w.chadwick@truetrust.co.uk>, "public-credentials (public-credentials@w3.org)" <public-credentials@w3.org>
- Message-ID: <CACrqygCvQpJnvx-YaynksCPu1hH8kYhTOXtGdFEkuezJ0SYK9g@mail.gmail.com>
On Mon, Aug 11, 2025 at 4:52 PM Pryvit NZ <kyle@pryvit.tech> wrote: > Be careful going down this path if you want the credential to be used on > the Web at all. > > If the verifying site can request the assurance that a liveness test > occurred and that the system isn’t tampered with then you’ll end up > recreating Web Envrionment Integrity guarantees. Many people on the Web > were against WEI and it didn’t proceed because of that opposition. > > Basically, if the credential provides any guarantees about the levels of > assurance used to collect the biometrics, liveness test, or device > integrity sites will stop caring about the claims in the credential itself > (e.g. name) and only the LOA metadata claim. > > That means a site that needs this probably becomes inaccessible to any OS > that doesn’t provide tamper resistant guarantees which is basically Linux > based OSes. > Kyle, Thank you for the reminder about Web Environment Integrity - I'd forgotten about that failed Google initiative, and your warning about how it could be recreated through credential LOA metadata is spot on: > "sites will stop caring about the claims in the credential itself (e.g. name) and only the LOA metadata claim." This is exactly the kind of systematic inversion I'm documenting in my policy framework - where a protection mechanism (age verification) becomes an exclusion tool. The fact that sites could use credential metadata to discriminate against Linux users or non-biometric devices, all while claiming child safety compliance, is a perfect example of what I call the "Platform Compliance Paradox." You're right that this makes explaining consent to users nearly impossible - how do you warn someone that their age verification is actually device fingerprinting? The technical side effect becomes the primary purpose, but remains hidden behind legitimate-sounding compliance requirements. This connects to a pattern I'm seeing everywhere: platforms using regulatory compliance as cover for architectural control. WEI failed when proposed openly, but as you note, it could succeed through the credential backdoor. We need to be explicit in standards that LOA metadata must not become a device discrimination vector. Your WEI warning perfectly captures our current moment: we have the cryptographic tools for sovereignty, but we're building systems that use them for surveillance instead. This inversion isn't inevitable - but preventing it requires exactly the kind of specific technical warnings we are discussing. -- Christopher Allen P.S. Separately, thank you for quoting the Cypherpunk Manifesto in the thread. That use of "sovereignty" predates my SSI work by decades, and I'll add it to my notes on early influences as I prepare for the 10th Anniversary revision of the Principles of Self-Sovereign Identity next year. The cypherpunks understood that cryptographic tools could enforce individual sovereignty against institutional power - a vision we seem to be inverting rather than implementing.
Received on Wednesday, 13 August 2025 05:23:35 UTC