- From: Kim Hamilton <kimdhamilton@gmail.com>
- Date: Thu, 08 May 2025 01:57:44 +0000
- To: steve.e.magennis@gmail.com
- Cc: "Daniel Hardman" <daniel.hardman@gmail.com>, "Manu Sporny" <msporny@digitalbazaar.com>, "W3C Credentials CG" <public-credentials@w3.org>
- Message-ID: <maeptcra.01121d51-e11a-4b79-a354-180b70704ec2@we.are.superhuman.com>
The issue is with this sentence: > > The only way a verifier can resolve uncertainty between the information > Alice presents and what the issuer currently intends to be the factual > state of the information is with a phone home step, or 3 rd party > involvement > > Status checks can be implemented without is referred to as "phone home" in the text from the use cases doc Sent via Superhuman ( https://sprh.mn/?vip=kimdhamilton@gmail.com ) On Wed, May 07, 2025 at 5:57 PM, < steve.e.magennis@gmail.com > wrote: > > > > A little bit off the main topic, but wanted to comment on: > > > > Verifiers must also be able to inquire about the *current* status of a > credential without revealing to the issuer > > > > > > > > > > > > I think tension occurs here because usually a holder is presenting > information to a verifier that has been attested to by some other party. > To put another way, the issuer, not the holder is the data of record and > therefore is the *sole authoritative source* *of the* *state of the data of > record at any given time*. For example say an employer attested at some > point that Alice was an employee of theirs and issued her a credential to > that effect. At some later point if the employer stipulated that Alice was > no longer an employee, then Alice is no longer an employee from the > perspective of a verifier regardless of what the credential she possesses > says. The only way a verifier can resolve uncertainty between the > information Alice presents and what the issuer currently intends to be the > factual state of the information is with a phone home step, or 3 rd party > involvement. I see most use cases leverage an expiration date as an > alternative to phoning home which is low risk in many situations but is > definitely not the same as knowing. I’ve also seen some folks try to > implement a chain of update events to held credentials where the issuer > has both the desire to maintain current data state and sufficient > influence over the holder to insist they update the credentials they hold. > In most situations I’ve come across either the level of risk using an > expiration date is tolerable or some party has sufficient influence over > the holder to insist they keep their credentials current at all times. I > suspect 1 st responders fall into this later category. > > > > > > > > -S > > > > > > > > *From:* Kim Hamilton < kimdhamilton@ gmail. com ( kimdhamilton@gmail.com ) > > > *Sent:* Wednesday, May 7, 2025 1:38 PM > *To:* Daniel Hardman < daniel. hardman@ gmail. com ( > daniel.hardman@gmail.com ) > > *Cc:* Manu Sporny < msporny@ digitalbazaar. com ( msporny@digitalbazaar.com > ) >; W3C Credentials CG < public-credentials@ w3. org ( > public-credentials@w3.org ) > > *Subject:* Re: When is "phone home" ok, if ever? > > > > > > > > > Daniel's point (also touched on by Kerri and Filip) is the essential > missing distinction in this discussion. I'd also like to chime in with my > supporting thoughts: > > > > > > > > > > *1. Auditing is a separate concern/function from verifying.* > > > > > > > > > > Put differently, there seems to be a belief that, in order to satisfy > issuer auditing requirements, verification must be designed that the > issuer can also *take a peak* while verification is occurring. > > > > > > > > > > *2. Standards about making choices (to quote Mike Jones)* > > > > > > > > > > Both the spec and Verifiable Credentials Use Cases ( > https://w3c.github.io/vc-use-cases/#verify-credential ) doc are brutally > clear that verification must be possible without phoning home. From the > use cases doc: > > > > > > > > >> >> >> Verifiers must also be able to inquire about the current status of a >> credential without revealing to the issuer >> >> >> >> >> 1. The entity requesting that status >> >> >> > > >> >> >> 2. The credential for which status is being checked >> >> > > >> >> >> 3. The subject of the credential being checked >> >> > > > > > > > > > > > > >> >> >> In short, it must be possible to fully verify a credential without leaking >> usage data to the issuer or anyone else. This is to avoid the so-called >> "phone home" problem. >> >> > > > > > > > > > The date on that document is 17 April 2025. Has something changed in the > last 2 weeks that we are deciding to deviate from this principle, which > has been present (at minimum) for the 9 years I've been thinking > about/using this spec? > > > > > > > > > > It's pretty clear that verification of a credential is not intended to be > burdened with otherwise valid auditing requirements mentioned above; keep > these concerns separate. > > > > > > > > > > Sneaking new use cases and requirements into an otherwise mature spec > makes it harder to reason about, not just for implementors but for privacy > & legal experts. > > > > > > > > > > In short, auditing is a separate behavior / use case, and let's just > handle it appropriately, while not compromising the existing spec. > > > > > > > > > > Kim > > > > > > > > > > > > > > > > > > > > > > > > > Sent via Superhuman ( https://sprh.mn/?vip=kimdhamilton@gmail.com ) > > > > > > > > > > > > > > On Wed, May 07, 2025 at 11:40 AM, Daniel Hardman < daniel. hardman@ gmail. > com ( daniel.hardman@gmail.com ) > wrote: > > >> >> >> Why can't phone home just be a separate behavior from verification? That >> is, particular verifiers phone home not to verify a credential, but >> because a governance framework that constrains their behaviors in certain >> contexts says that they should, in addition to verifying, also notify a >> stakeholder (not necessarily the issuer) that a credential has been used? >> Conceptually, this is not different from the verifier sharing a log of >> their activity, and it could totally be done without complicating the >> standardized VC interactions. It would be an attribute of a usage pattern >> under a particular governance, not an attribute of the credentials >> themselves. >> >> >> >> >> >> >> >> >> On Fri, May 2, 2025 at 2:42 PM Manu Sporny < msporny@ digitalbazaar. com ( >> msporny@digitalbazaar.com ) > wrote: >> >> >> >>> >>> >>> Starting the weekend off with a charged question that I expect this >>> community to have some strong feelings about. :) >>> >>> As we presented earlier this year, some of us are working with first >>> responders (fire fighters, emergency medical technicians, law >>> enforcement, and support personnel) to deploy verifiable credentials >>> for large scale disaster response scenarios. >>> >>> The first and simplest use case is a "digital badge" for a first >>> responder that identifies who they are to security personnel that are >>> trying to secure a particular area during a wildfire, earthquake, >>> hurricane, or other large scale disaster. It can also be useful for >>> citizens that need to check a first responder's credentials that might >>> need to enter their property or their home. >>> >>> For this use case, some of these first responder organizations are >>> wondering if we can implement a form of "phone home", with the consent >>> of the responder, to "check in" when their badge is verified. There >>> are even requests for an "active tracking beacon" for firefighters >>> going into dangerous areas that might need to be rescued themselves if >>> they get into trouble. >>> >>> So, the "phone home" here is opt-in/consent-based and viewed by both >>> the responders and their agencies as a safety feature that could save >>> lives. This feature would exist on the physical badges (VC barcodes) >>> and digital badges (VCs). It could probably be implemented as a >>> ping-back mechanism, where a verifier scanning the badge would call an >>> HTTP endpoint with the VC that was scanned and possibly geocoordinates >>> (for rescue/audit purposes) and a VC for the entity performing the >>> scan (for auditability purposes). It could be "turned off" by choosing >>> NOT to selectively disclose the pingback location (but that would >>> probably only work in the digital badge version). >>> >>> Now, clearly, this sort of functionality is something we've >>> collectively warned against for a very long time. Implementing this >>> for something like a driver's license is a horror show of potential >>> privacy and civil liberty violations. However, implementing this for a >>> first responder that's running into a wildfire to save a town feels >>> different. >>> >>> If we think this is a legitimate use case, standardizing it might >>> allow digital wallets to warn people before presentation of the >>> digital credential. So, rather than organizations implementing this >>> anyway, but in a proprietary way where the "phone home" is hidden, >>> this would be a way of announcing the privacy danger if the badge is >>> used w/o consent or selective disclosure. >>> >>> So, some questions for this community: >>> >>> 1. Is this a legitimate use case? >>> 2. Is this sort of feature worth standardizing? >>> 3. Is there a more privacy-preserving way to accomplish this feature? >>> 4. Should there be wallet guidance around this feature? If so, what >>> should it be? >>> 5. Should there be verifier guidance around this feature? If so, what >>> should it be? >>> 6. What horrible, civil liberties destroying outcome are we most afraid of >>> here? >>> >>> Interested to... oh, wait a sec... *puts on a flame retardant suit*... >>> >>> Interested to hear everyone's thoughts. :) >>> >>> -- manu >>> >>> -- >>> Manu Sporny - https:/ / www. linkedin. com/ in/ manusporny/ ( >>> https://www.linkedin.com/in/manusporny/ ) >>> Founder/CEO - Digital Bazaar, Inc. >>> https:/ / www. digitalbazaar. com/ ( https://www.digitalbazaar.com/ ) >>> >>> >> >> >> > >
Received on Thursday, 8 May 2025 01:57:53 UTC