- From: Steffen Schwalm <Steffen.Schwalm@msg.group>
- Date: Mon, 16 Feb 2026 04:46:46 +0000
- To: Jori Lehtinen <lehtinenjori03@gmail.com>
- CC: Manu Sporny <msporny@digitalbazaar.com>, NIKOLAOS FOTIOY <fotiou@aueb.gr>, Filip Kolarik <filip26@gmail.com>, public-credentials <public-credentials@w3.org>
- Message-ID: <AM8P191MB1299A2FC9A9897568EE7AA74FA6CA@AM8P191MB1299.EURP191.PROD.OUTLOOK.COM>
"f the physical ID chip is truly the root of binding and key custody and the wallet API reliably enforces user presence. Under that assumption, his model gives verifiers strong cryptographic guarantees with fewer centralized intermediaries." Thanks for confirming my claims. When it comes to keys the device or keys must be trusted through certification. Best Steffen ________________________________ Von: Jori Lehtinen <lehtinenjori03@gmail.com> Gesendet: Sonntag, 15. Februar 2026 16:05 An: Steffen Schwalm <Steffen.Schwalm@msg.group> Cc: Manu Sporny <msporny@digitalbazaar.com>; NIKOLAOS FOTIOY <fotiou@aueb.gr>; Filip Kolarik <filip26@gmail.com>; public-credentials <public-credentials@w3.org> Betreff: Re: Utah State-Endorsed Digital Identity (SEDI) legislation Caution: This email originated from outside of the organization. Despite an upstream security check of attachments and links by Microsoft Defender for Office, a residual risk always remains. Only open attachments and links from known and trusted senders. Steffen, I will try to properly go trough the legal texts you presented, and try to demonstrate my solution more from your perspective. I pasted our arguments in to AI and asked for a neutral analysis, that I think is worth reading. ----------------------------------- Hereˇ¦s a neutral, text-grounded review taking Joriˇ¦s proposal at face value: that the anchor is the physical ID (chip), and that identity proofing, key custody, and user authentication are handled locally by a standardized wallet API (invoked by apps), with a public registry/log for verifiers. What each side is actually claiming Joriˇ¦s model (as described in the thread you pasted) Joriˇ¦s core claim is not ˇ§trust without governance,ˇ¨ but ˇ§trust with minimized governanceˇ¨: legislation/courts should define what must be verifiable, while the system should make those facts verifiable by anyone via cryptography. In concrete terms, Jori proposes: * Identity proofing / binding: done by the wallet locally using the physical ID (e.g., MRZ + NFC chip read), i.e., proof derived from government-issued document cryptography rather than from a separate certified service provider. * Secure keys / non-exfiltration: the signing key should be hosted only within the physical identity instrument (or a comparable tamper-resistant element), so proofs can be made without exporting the key. * User authentication: ˇ§basic frontend stuffˇ¨ (PIN/biometrics) gating use of the wallet API on-device. * Verifier trust: verifiers check signatures and retrieve necessary verification material (public keys, status/events) from a registry / log (in his later messages: a ˇ§global legal trust blockchainˇ¨ or jurisdiction-specific registry). * Liability / redress: courts set admissibility requirements; parties keep signed artifacts for their own legal safety; revocation events are logged (ˇ§kill itˇ¨) with timestamps. This is a coherent cryptographic architecture if the physical ID really can play the role he assigns it. Steffenˇ¦s model (as argued in the thread) Steffenˇ¦s claim is that for high-assurance / legally binding outcomes, you need an assurance regime: certified processes, certified environments, and supervised providersˇXbecause (in his view) legal trust is not only ˇ§signature verifies,ˇ¨ but also ˇ§the whole pipeline was operated under validated conditions.ˇ¨ He ties that to the EU approach: * wallet ecosystem rules + certification; and * registries/trust lists for discoverability and policy control; and * long-term validation / preservation expectations. What eIDAS/EUDI objectively does (relevant to this dispute) From the Regulation text: * The wallet app components must be open-source licensed (with a limited carve-out for some non-device components). * Wallet use is voluntary and the framework is intended to support privacy measures like unlinkability and limiting tracking/observability by wallet providers. * Relying parties who want to rely on wallets for digital interactions must register, disclose what they intend to request, and Member States must publish that info in a signed/sealed form suitable for automation. * That registration is explicitly described as intended to be cost-effective, proportionate, and not a pre-authorization process (in the recitals). * The Commission adopted implementing regulations in late 2024 that specify wallet integrity/core functions, PID/EAA rules, protocols/interfaces, and notification mechanics. Separately, the EU ˇ§trust list / LOTLˇ¨ idea Steffen points to is real: ETSI describes a Commission-published ˇ§List Of Trusted Listsˇ¨ that helps locate/authenticate national trusted lists. So: Steffen is right that the EU system is built around both crypto and governance registries. Jori is right that registries are governance artifacts, not cryptographic proof of runtime behavior. Does Joriˇ¦s ˇ§physical ID anchor + wallet APIˇ¨ address the hard problems? If we assume the physical ID and wallet environment can do what Jori asserts, then yesˇXconceptually he has an answer for each. The remaining question becomes ˇ§is the assumption valid and deployable at scale?ˇ¨ 1) Identity proofing / binding a real person to a key Joriˇ¦s answer: bind to the physical ID by using chip-based verification locally (MRZ + NFC), then sign with a key tied to that instrument. Neutral assessment: This addresses binding to the extent that: * the physical IDˇ¦s chip cryptography is strong and designed for this kind of use; and * the wallet can reliably validate document authenticity (and status) using jurisdiction-backed data. eIDAS also explicitly talks about assurance level ˇ§highˇ¨ and identity proofing as part of the wallet ecosystem. So the disagreement isnˇ¦t ˇ§do we need identity proofing,ˇ¨ itˇ¦s ˇ§do we centralize it in certified providers/processes vs. push it down into device + document cryptography.ˇ¨ 2) Secure key generation and non-exfiltration Joriˇ¦s answer: keys are ˇ§hosted only within the signerˇ¦s physical identity instrument,ˇ¨ so exfiltration is blocked by hardware design. Neutral assessment: If the physical ID truly offers a non-exportable signing key usable for legally binding signatures, then this is a strong non-exfiltration story. If it doesnˇ¦t (or if jurisdictions vary), then the model needs a fallback (e.g., secure element in device, external token, etc.), and then youˇ¦re back in the world of device assurance and certification tradeoffs. 3) User authentication (PIN/biometrics) Joriˇ¦s answer: wallet API gates signing on-device using standard local auth. Neutral assessment: This is plausible and consistent with how most secure-signature UX works today. The open issue is not ˇ§can you do it,ˇ¨ but ˇ§whatˇ¦s the minimum acceptable UX/security baselineˇ¨ and ˇ§how do verifiers/courts reason about it.ˇ¨ eIDAS leans toward formalized requirements and assurance levels. 4) Liability and redress Joriˇ¦s answer: legislation defines what must be verifiable in court; parties retain evidence; revocation events are timestamped; verification is independent. Neutral assessment: This is the point where Steffenˇ¦s worldview bites: legal systems also care about who is responsible when things fail. Joriˇ¦s model can support legal adjudication if the law recognizes those proofs as sufficient and if thereˇ¦s a clearly accountable operator for the status/registry layer (even if itˇ¦s a distributed system). eIDAS bakes this into the framework via roles, supervision, and published mechanisms (including relying party registration and wallet governance obligations). So Joriˇ¦s approach can address liabilityˇXbut it still needs a defined legal mapping from proofs ˇ÷ responsibility, and a defined accountable perimeter around the registry/log layer. 5) Governance and upgrades Joriˇ¦s answer (as written): standards come from ˇ§global academic consensus,ˇ¨ signed by a trusted publisher; OS verifies; keep things dynamic. Neutral assessment: This is the least specified part of his proposal in the thread. Even if you accept ˇ§open standards + signed releases,ˇ¨ you still need: * a decision process for rule changes, * a mechanism for key/algorithm transitions, * and an authority model for publishing ˇ§the standardˇ¨ and ˇ§the allowed profiles.ˇ¨ The EU approach here is explicit: implementing acts + referenced standards + update cycles, and the trust list ecosystem evolves (e.g., updates to trusted-list formats aligned to ETSI versions). Joriˇ¦s approach can absolutely have governanceˇXbut it needs to be spelled out as an actual mechanism, not just an aspiration. Where the disagreement stays real (even under your assumption) Even granting that physical ID + wallet API covers identity proofing, non-exfiltration, and user auth, the key remaining fault line is: Do we want legal trust to flow primarily from: * (A) cryptographic proofs anchored in user-held instruments + public verification material (Jori), or * (B) cryptographic proofs plus a regulated provider ecosystem and registries that define who may issue/operate under certain labels (Steffen)? Both are compatible with cryptography. They differ on market structure and choke points: * Jori is trying to minimize ˇ§permissioned intermediariesˇ¨ in the private sector by making the system self-verifying for verifiers. * Steffen is trying to ensure legal reliability by requiring an ecosystem that can be audited/supervised and held liableˇXat the risk of higher barriers to entry. eIDAS explicitly tries to reduce some choke-point risks (open-source requirement; proportional, non-preauthorization relying-party registration; voluntary use), but it still builds real governance rails (registration mechanisms, published signed lists, implementing acts and certification regimes). Bottom line A factual way to summarize it: * Jori is not ignoring the ˇ§hard problemsˇ¨ if the physical ID chip is truly the root of binding and key custody and the wallet API reliably enforces user presence. Under that assumption, his model gives verifiers strong cryptographic guarantees with fewer centralized intermediaries. * Steffen is emphasizing that in EU-style regulated environments, the system must also produce institutionally legible assurances (accountability, supervision, standardized procedures, long-term validation expectations). eIDAS explicitly encodes a lot of that in law + implementing regs. The unresolved question is not ˇ§crypto vs non-crypto.ˇ¨ Itˇ¦s whether the governance layer is a thin definition of admissible proofs (Jori) or a thick regulated ecosystem with certified actors and registries (Steffen)ˇXand what that does to competition, resilience, and user control in practice. --------------- Best, Jori
Received on Monday, 16 February 2026 04:46:53 UTC