- From: Amir Hameed <amsaalegal@gmail.com>
- Date: Mon, 16 Feb 2026 10:51:55 +0530
- To: Steffen Schwalm <Steffen.Schwalm@msg.group>
- Cc: Joe Andrieu <joe@legreq.com>, NIKOLAOS FOTIOY <fotiou@aueb.gr>, Kyle Den Hartog <kyle@pryvit.tech>, Adrian Gropper <agropper@healthurl.com>, Manu Sporny <msporny@digitalbazaar.com>, Filip Kolarik <filip26@gmail.com>, public-credentials <public-credentials@w3.org>
- Message-ID: <CANGYBsx4Kk1r7fDp0HgR_GBd7A=3nnMM+gYGia7i=i7FDjLmSw@mail.gmail.com>
Appreciate that, Steffen. The remaining challenges feel less about whether and more about how: governance, lifecycle, UX, and deployment at scale. That’s where meaningful progress can be made. On Mon, 16 Feb 2026 at 10:49 AM, Steffen Schwalm <Steffen.Schwalm@msg.group> wrote: > "So perhaps the question is not SSI vs government systems, but: > How do we accelerate implementation while aligning decentralization, > usability, and regulatory trust? > > The meaningful debate is about: > > • Deployment speed > > • Governance design > > • Privacy guarantees > > • Recovery & lifecycle management > > • Real-world adoption > > > Trust, ultimately, is something we build into the system’s mechanics — not > something we merely assert." > > - Exactly > > > > ------------------------------ > *Von:* Amir Hameed <amsaalegal@gmail.com> > *Gesendet:* Montag, 16. Februar 2026 06:08 > *Bis:* Steffen Schwalm <Steffen.Schwalm@msg.group> > *Cc:* Joe Andrieu <joe@legreq.com>; NIKOLAOS FOTIOY <fotiou@aueb.gr>; > Kyle Den Hartog <kyle@pryvit.tech>; Adrian Gropper <agropper@healthurl.com>; > Manu Sporny <msporny@digitalbazaar.com>; Filip Kolarik <filip26@gmail.com>; > public-credentials <public-credentials@w3.org> > > *Betreff:* Re: Utah State-Endorsed Digital Identity (SEDI) legislation > > *Caution:* This email originated from outside of the organization. > Despite an upstream security check of attachments and links by Microsoft > Defender for Office, a residual risk always remains. Only open attachments > and links from known and trusted senders. > > Hi all, > > > I’m not sure we’re framing the discussion in the most productive way. > > > Self-sovereign identity (SSI) is no longer purely conceptual — elements of > it already exist in our day-to-day digital interactions. The core shift is > not simply about what identity model we choose, but about user control, > privacy, and how trust is established. > > > A web-of-trust perspective reminds us that trust is not something we can > centrally declare or predefine. It emerges from verifiable interactions, > cryptographic proofs, and governance frameworks — rather than being assumed > by default. > > > Decentralized identifiers (DIDs), for example, allow identity to function > more like a network address anchored in cryptography instead of a record > anchored solely in an institution. This introduces properties such as > portability, reduced correlation, and resistance to single points of > control. These characteristics are not theoretical; they are already being > implemented and tested in real systems. > > > That said, government-led frameworks like EUDI or SEDI play an important > role in: > > • Legal recognition > > • Interoperability at scale > > • Liability and assurance models > > • Cross-border acceptance > > > So perhaps the question is not SSI vs government systems, but: > > > How do we accelerate implementation while aligning decentralization, > usability, and regulatory trust? > > > The meaningful debate is about: > > • Deployment speed > > • Governance design > > • Privacy guarantees > > • Recovery & lifecycle management > > • Real-world adoption > > > Trust, ultimately, is something we build into the system’s mechanics — not > something we merely assert. > > > Regards, > > Amir Hameed Mir > > Founder of Sirraya Labs > > > On Mon, 16 Feb 2026 at 10:26 AM, Steffen Schwalm <Steffen.Schwalm@msg.group> > wrote: > > Joe, > > > 1. Trusted issuer registry show somebody is allowed to issue something > and trustworthy because in the registry > > > - Controls on trusted issuer work in parallel e.g. > - requirements to inform about security breaches within 24 hours > Possibility for SB to start investigation or new conformity assessment > by CAB > - Conformity assessment based on provable international standards > - Clear liability for QTSP > > > 2) Means nothing dangerous in arguments of Nikos, it`s pretty much > similar to root stores from browsers but in hands of trustworthy authorities > > 3) there`s no centralized but distributed system as we have > 250 QTSP, 31 > TL, n CAB > > So recommend that we discuss alongside the actual regulation and eiDAS > technical framework. > > Best > Steffen > > > ------------------------------ > *Von:* Joe Andrieu <joe@legreq.com> > *Gesendet:* Montag, 16. Februar 2026 05:45 > *Bis:* NIKOLAOS FOTIOY <fotiou@aueb.gr> > *Cc:* Kyle Den Hartog <kyle@pryvit.tech>; Adrian Gropper < > agropper@healthurl.com>; Manu Sporny <msporny@digitalbazaar.com>; Steffen > Schwalm <Steffen.Schwalm@msg.group>; Filip Kolarik <filip26@gmail.com>; > public-credentials <public-credentials@w3.org> > *Betreff:* Re: Utah State-Endorsed Digital Identity (SEDI) legislation > > *Caution:* This email originated from outside of the organization. > Despite an upstream security check of attachments and links by Microsoft > Defender for Office, a residual risk always remains. Only open attachments > and links from known and trusted senders. > On Sun, Feb 15, 2026 at 1:15 PM NIKOLAOS FOTIOY <fotiou@aueb.gr> wrote: > > > “[browsers] don't have to "prove their code is secure” before engaging > with a website during a regulated activity”. > > This not true. Browsers have done this implicitly and many web sites trust > “well-known” browsers. If you try to access a web page with an “unknown” or > old browser you are denied access. Try for example "curl > https://www.aa.com/“. > > > This is a wonderful example of how we are talking past each other. In a > previous email you also suggested *curl > https://www.us.emb-japan.go.jp/itpr_en/travel_and_visa.htm > <https://www.us.emb-japan.go.jp/itpr_en/travel_and_visa.htm> * > > And, in fact, a simple curl request to that URL fails. Fascinating. That > surprised me. > > However, if you install curl-impersonate, those two URLs open up like a > jack-in-the-box on the third turn of the crank. > > *curl_ff98 https://www.us.emb-japan.go.jp/itpr_en/travel_and_visa.html > <https://www.us.emb-japan.go.jp/itpr_en/travel_and_visa.html> * > *curl_ff98 https://www.aa.com <https://www.aa.com>* > > So, I acknowledge that you are correct. Apparently, both American Airlines > and the Japanese Embassy "maintain a list" of approved browsers. A useless > list, but the filtering is happening. > > Unfortunately, they lack a way to prevent impersonating browsers from > accessing content. > > The thing is, you *can* maintain a list of approved browsers, but it's not > actually going to stop bad actors. At most, it will keep naive actors from > taking advantage of your system. > > Making matters worse, every browser with a developer mode allows current > users nearly unlimited access to the browser. It's trivially hackable. The > idea of a secure client is simply unrealistic. > > The situation is much like the truism that "Locks don't keep thieves out; > locks keep honest people honest." The only thing that "approved" lists > achieve is preventing a bunch of potentially legitimate requests in > exchange for the false hope that you are preventing malicious activity. You > aren't actually preventing non-standard browsers from accessing your site. > You're only preventing non-criminals from accessing your services in their > preferred way. You think you're making things better, but you're actually > preventing innovation in the client's processing context. I know. I've been > fighting the Web's ineffective security-by-obfuscation for decades. > > More dangerous is the fact that your advocacy creates a false sense of > security, literally telling people something is secure when it is not. > Seriously, your email here is a dangerous recommendation. For anyone > reading, please DO NOT think that approved browser lists actually prevent > "unapproved" browser access. > > The truism that you can't trust the client is not just a web phenomenon or > my opinion; it's a deep cybersecurity principle. You might want to argue > with me, but I suggest you do some research before arguing against the > combined wisdom of 50+ years of cybersecurity experience. > > Seriously, search for "cybersecurity can't trust the client" and you'll > see a wealth of diverse opinions explaining in various terms why you > actually can't trust the client in cyberspace. > > And what we're seeing in the EUDI is the false belief that you can somehow > trust "certain" clients, leading to a security architecture that > centralizes power in the name of security without actually creating a more > secure system. > > You may not agree that the bad things that many of us fear are bad. That's > fine. Differences in values are fine reasons for differences in policy. > However, you cannot legitimately assert that depending on secure clients is > effective security. It isn't. > > Since the system is ineffective and many people see real harm in its > explicit centrality, several of us would love to see the EU shift away from > this harmful and inevitably insecure approach. > > -j > > -- > Joe Andrieu > President > joe@legreq.com > +1(805)705-8651 > ------------------------------ > Legendary Requirements > https://legreq.com > > > > <http://www.avg.com/email-signature?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail> > Virus-free.www.avg.com > <http://www.avg.com/email-signature?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail> > >
Received on Monday, 16 February 2026 05:22:12 UTC