- From: Daniel Hardman <daniel.hardman@gmail.com>
- Date: Tue, 6 May 2025 08:37:49 -0600
- To: Manu Sporny <msporny@digitalbazaar.com>
- Cc: W3C Credentials CG <public-credentials@w3.org>, carsten.stoecker@spherity.com
- Message-ID: <CACU_ch=9NmTANEHs9Kf7bA9ED804baE+VuNNMsnxw4s3YrF4Vw@mail.gmail.com>
Carsten: There is some important thinking here. Thank you for sharing it. Can I suggest that perhaps it would be nice to change a term before you spread this thinking more widely? I believe that the use of the term "citizen" is problematic, because it puts anyone who is not a citizen into a non-existent third category, and it invites the incorrect assumption that the right of ordinary people to hold non-employee credentials is somehow tied to their government status. Stateless persons living in refugee camps should be able to get most forms of verifiable credentials. I was an expat living in Switzerland; my right to drive was proved with a drivers license issued by the Swiss government, but I was not a citizen there. I just went to a meet-and-greet with Afghan refugees; they are not citizens of the country where they live, but they pay taxes and need VCs documenting their vaccinations, their education, etc. Perhaps X2P (P = person) would be a better label. --Daniel On Tue, May 6, 2025 at 7:35 AM Manu Sporny <msporny@digitalbazaar.com> wrote: > Forwarding a really solid write up from Carsten since the email seems to > have not gone through on the CCG mailing list. > > ---------- Forwarded message --------- > From: <carsten.stoecker@spherity.com> > Date: Tue, May 6, 2025 at 4:09 AM > Subject: AW: When is "phone home" ok, if ever? > > Dear all, > > > > Thanks for raising the important questions around first responder > credentials, tracking, and consent. Your post sparked a deeper analysis on > our end about how fundamentally different “citizen” and “employee” use > cases are when it comes to verifiable credentials, privacy, tracking, > consent management and UX. We conducted the analysis drawing on our > expertise in employee wallets and business requirements, supported by > in-depth research facilitated through OpenAI Deep Research. > > > > We’ve compiled our findings from an employee related perspective into a > .md document, which you can access here: > https://hackmd.io/@KsjE2xL6Q_CAsVkYWt58iA/BJ3I9Vwxxx > > The key takeaway is that employee credentials—like those for first > responders—must be treated with different assumptions than citizen ones. > Tracking, consent, wallet structure, and UX expectations diverge > significantly due to operational and legal differences. > > > > For example, we argue that: > > - Employee credentials justify tracking (with limits) for safety, > compliance, and auditing. > - Privacy-enhancing technologies are often counterproductive in these > scenarios. > - Terms of use should define purpose, context, and data retention > obligations. > - Wallet and verifier design should account for these distinctions to > protect workers while supporting operations. > > We also suggest formalizing the separation of private and > employment-related wallets to avoid consent ambiguity and security policy > conflicts as well as “wallet dance” when business processes engage with > personal wallets on private hardware outside the broader organisational > ecosystem infrastructure. > > > > Looking forward to hearing your thoughts—and happy to contribute to > standardization discussions on this topic. > > > > Best regards, > Carsten > > > > > > *Key Concepts from our Research Document* > > > > *1. Distinction between X2C and X2E Use Cases* > > - *X2C (Entity-to-Citizen):* Consent-centric, minimal disclosure, > governed by strong privacy expectations (e.g. GDPR). > - *X2E (Entity-to-Employee):* Includes justified tracking for > compliance, safety, and auditing—subject to workplace transparency and > proportionality requirements. > > > *2. Citizen vs Employee Credentials* > > - Employee credentials (e.g. digital badges for first responders) > support operational needs like authentication, location tracking, and > role-based access. > - These are structurally and functionally different from credentials > used in purely personal contexts. > > > *3. Separate Wallets for Personal and Professional Use* > > - Distinct wallets avoid “wallet dance” issues and reduce privacy and > compliance friction. > - eIDAS 2.0’s one-wallet policy introduces complications, especially > in high-security employment settings. > - A business wallet infrastructure is proposed, inheriting verified > identity elements under organizational control. > > > *4. Consent and Privacy Management* > > - In X2E scenarios, consent is often non-voluntary, and must be > replaced with transparent policy-based controls. > - Privacy-enhancing technologies (PETs) offer limited value in > operationally intensive environments and may impair usability and > interoperability. > > > *5. Terms of Use for Credentials and Presentations* > > - Terms should specify scope, context, permitted data uses, and data > retention/deletion timelines. > - Wallets and verifier apps should enforce or warn on violations of > these terms, helping avoid repurposing or misuse. > > > *6. UX and Simplicity for Critical Scenarios* > > - Especially in the case of first responders, the focus should be on > operational simplicity and trust—not abstract privacy guarantees. > - The use of verifiable credentials should enhance coordination > without introducing excessive technical complexity. > > Mit freundlichen Grüßen / Kind regards > > > > *Carsten Stöcker*Founder, CEO Spherity GmbH > +49 152 08930 990 > > Spherity GmbH <http://spherity.com/> | Emil-Figge-Str. 80 | 44227 Dortmund > > >
Received on Tuesday, 6 May 2025 14:38:09 UTC