- From: Jori Lehtinen <lehtinenjori03@gmail.com>
- Date: Mon, 16 Feb 2026 16:15:59 +0200
- To: amsaalegal@gmail.com
- Cc: Steffen.Schwalm@msg.group, filip26@gmail.com, fotiou@aueb.gr, joe@legreq.com, kyle@pryvit.tech, agropper@healthurl.com, msporny@digitalbazaar.com, public-credentials@w3.org
- Message-ID: <CAA6zkAs_TRwFPM5M2+O9KZtBXAQhXKkgb1Ra1AwEqx2oHcKR8w@mail.gmail.com>
♥️ Jori reagoi Gmailissa <https://www.google.com/gmail/about/?utm_source=gmail-in-product&utm_medium=et&utm_campaign=emojireactionemail#app> ma 16. helmik. 2026 klo 16.07 Amir Hameed <amsaalegal@gmail.com> kirjoitti: > Steffen, > > > Compliance is a configuration choice, not an architectural primitive. > > All the items you listed naturally map onto the same three building blocks: > > • DID → Identifier / control / resolution > > • VC → Attestation / claims / signature > > • Registry → Trust anchor / status / discovery > > > Questions like: > > – Which DID method? > > – Which VC encoding (JWT, JSON-LD, JAdES, SD-JWT)? > > – Which trust framework (eIDAS, ETSI, national PKI)? > > …are selection decisions, not indicators that a new structural layer is > required. > > > When I argue against “additional layers,” I’m referring to the recurring > tendency to introduce: > > • new governance abstractions > > • new mediation workflows > > • new graph models > > …instead of simply binding existing legal and assurance requirements onto > the same primitives. > > > For example: > > • Under eIDAS → choose QSeal/QES-compatible signatures > > • Under another jurisdiction → choose an equivalent assurance mechanism > > Different labels, identical trust logic. > > > The underlying system remains: > > Identifier → Attestation → Resolution > > Everything else becomes: > > Policy mapping / assurance profile / encoding preference > > > The model is therefore legally agnostic but compliance-adaptable. > > > We should be careful not to conflate: > > “Choosing a standard” > > with > > “Needing more complexity.” > > > Selecting JAdES instead of another signature format does not alter the > architecture any more than choosing TLS 1.3 alters the concept of > encryption. > > > If we agree on the primitives, then standards function as interoperability > and assurance profiles, not conceptual forks. > > More importantly, perhaps the real opportunity here is alignment rather > than positioning. > > Most of us are ultimately optimizing for the same outcomes: > > • Sovereignty > > • Privacy > > • Interoperability > > • Practical deployability > > • Human-centric access to digital systems > > The tension often arises not from disagreement on goals, but from > different risk models: > > • Regulatory risk > > • Deployment risk > > • Adoption risk > > • Liability framing > > > If we explicitly separate: > > > Architecture → Policy → Assurance → Jurisdiction > > …we may find more common ground and reduce duplicated effort. > > > A balanced model should allow: > > • Technical minimalism > > • Regulatory compatibility > > • Evolution without fragmentation > > > That seems like a shared interest across ecosystems. > > > Regards, > > Amir > > > On Mon, 16 Feb 2026 at 7:16 PM, Steffen Schwalm <Steffen.Schwalm@msg.group> > wrote: > >> Amir, >> >> When I needs legally compliant evidence for origin of data in >> interoperable way. >> >> >> - Which DID method of the 238 registered do I use? >> - Which trust registry standardized where, approved by whom? >> - How is the legal entity identified which is originator of certain >> data? >> - How are signing key created, securely stored and managed? >> - How is VC created based on which format and signed with which >> signature in which format standardized where? >> >> >> What I need for proof of origin: I need the one who signed the VC e.g. >> using a qseal/QES for the VC. DID+VC+Registry could be sufficient if (by >> very rough example of eIDAS) >> >> >> - DID method defined and standardized somewhere (e.g .CEN TS on >> Functional and interoperability requirement of DID" based on W3C DID SPec) >> - DID of trusted issuer stored in Trust Registry which is >> standardized somewhere (e.g. Trust Model EBSI even if EBSI is not in any >> formal SDO currently) >> - VC created using defined standard and data model (e.g. W3C VCDM >> executed as JWT/SD-JWT) >> - VC signed with QSeal acc. ETSI EN 319 411-1 as JAdES >> >> >> Means I guess the answer if "When the fundamental building blocks — DID >> + VC + Registry — already provide the necessary guarantees of integrity, >> provenance, and scalability, introducing additional administrative layers >> risks adding friction without adding capability.." is true depends on the >> applicable application area and its legal and technical framework. We can´t >> say it´s true in any case. >> >> >> Best >> Steffen >> >> >> ------------------------------ >> *Von:* Amir Hameed <amsaalegal@gmail.com> >> *Gesendet:* Montag, 16. Februar 2026 14:37 >> >> *Bis:* Steffen Schwalm <Steffen.Schwalm@msg.group> >> *Cc:* Filip Kolarik <filip26@gmail.com>; Jori Lehtinen < >> lehtinenjori03@gmail.com>; NIKOLAOS FOTIOY <fotiou@aueb.gr>; Joe Andrieu >> <joe@legreq.com>; Kyle Den Hartog <kyle@pryvit.tech>; Adrian Gropper < >> agropper@healthurl.com>; Manu Sporny <msporny@digitalbazaar.com>; >> public-credentials <public-credentials@w3.org> >> *Betreff:* Re: Utah State-Endorsed Digital Identity (SEDI) legislation >> >> *Caution:* This email originated from outside of the organization. >> Despite an upstream security check of attachments and links by Microsoft >> Defender for Office, a residual risk always remains. Only open attachments >> and links from known and trusted senders. >> Steffen , >> >> Why not can we discuss? Can you give me one use case where it doesn’t >> hold? >> >> Regards >> >> On Mon, 16 Feb 2026 at 7:05 PM, Steffen Schwalm <Steffen.Schwalm@msg.group> >> wrote: >> >> Amir, >> >> I guess we have disagreement in "When the fundamental building blocks — >> DID + VC + Registry — already provide the necessary guarantees of >> integrity, provenance, and scalability, introducing additional >> administrative layers risks adding friction without adding capability.." >> >> My answer would be: No, DID+VC+REgistry alone are not sufficient >> >> Best >> Steffen >> >> >> ------------------------------ >> *Von:* Amir Hameed <amsaalegal@gmail.com> >> *Gesendet:* Montag, 16. Februar 2026 14:31 >> *Bis:* Steffen Schwalm <Steffen.Schwalm@msg.group> >> *Cc:* Filip Kolarik <filip26@gmail.com>; Jori Lehtinen < >> lehtinenjori03@gmail.com>; NIKOLAOS FOTIOY <fotiou@aueb.gr>; Joe Andrieu >> <joe@legreq.com>; Kyle Den Hartog <kyle@pryvit.tech>; Adrian Gropper < >> agropper@healthurl.com>; Manu Sporny <msporny@digitalbazaar.com>; >> public-credentials <public-credentials@w3.org> >> >> *Betreff:* Re: Utah State-Endorsed Digital Identity (SEDI) legislation >> >> *Caution:* This email originated from outside of the organization. >> Despite an upstream security check of attachments and links by Microsoft >> Defender for Office, a residual risk always remains. Only open attachments >> and links from known and trusted senders. >> >> Steve, >> >> I’m glad we’ve reached alignment. If we agree that the apparent >> “complexities” of multi-party trade are simply recursive applications of >> the same underlying cryptographic relationships, then the path forward >> becomes much clearer >> >> My core point is straightforward: we should resist the temptation to >> over-engineer the standards. When the fundamental building blocks — DID + >> VC + Registry — already provide the necessary guarantees of integrity, >> provenance, and scalability, introducing additional administrative layers >> risks adding friction without adding capability. >> >> The remaining challenge is less conceptual and more operational. Our >> focus should be on ensuring that the Verifiable Linked Data Graph remains >> as lean, composable, and decentralized as the mathematics that underpins >> it. Systems designed with this discipline are far more likely to achieve >> real-world adoption across diverse trade environments. >> >> I’d be happy to share observations from field deployments that may help >> keep the UN/CEFACT models closely anchored to what proves robust at scale. >> >> Looking forward to seeing these ideas continue to mature into practice. >> >> >> Regards, >> >> Amir >> >> >> On Mon, 16 Feb 2026 at 6:52 PM, Steffen Schwalm <Steffen.Schwalm@msg.group> >> wrote: >> >> Hi Filip, >> >> It already works as we can see with eIDAS 1 in Europe and the fact that >> half of the world reuse ETSI Standards reg. Signatures, seals, trustlists >> etc. It will workd with eiDAS 2 as well as we observe similar on eIDAS 2 >> related standards. >> >> The formal process means: Members of SDO decide - not regulators ;-) >> >> Best >> Steffen >> ------------------------------ >> *Von:* Filip Kolarik <filip26@gmail.com> >> *Gesendet:* Montag, 16. Februar 2026 14:19 >> >> *An:* Steffen Schwalm <Steffen.Schwalm@msg.group> >> *Cc:* Jori Lehtinen <lehtinenjori03@gmail.com>; Amir Hameed < >> amsaalegal@gmail.com>; NIKOLAOS FOTIOY <fotiou@aueb.gr>; Joe Andrieu < >> joe@legreq.com>; Kyle Den Hartog <kyle@pryvit.tech>; Adrian Gropper < >> agropper@healthurl.com>; Manu Sporny <msporny@digitalbazaar.com>; >> public-credentials <public-credentials@w3.org> >> *Betreff:* Re: Utah State-Endorsed Digital Identity (SEDI) legislation >> >> >> *Caution:* This email originated from outside of the organization. >> Despite an upstream security check of attachments and links by Microsoft >> Defender for Office, a residual risk always remains. Only open attachments >> and links from known and trusted senders. >> Thanks, Steffen, >> >> It’s clear that we are far too far apart. The legislation is part of the >> problem, the EU simply wants to control everything and will achieve >> nothing. I understand that you don’t agree with this, but for now, I >> suppose that’s the only thing we can agree on. >> >> The EU approach will fail again, not because there is no collaboration >> between the EU and W3C, but because the kind of formal process you favor >> produces nothing truly useful. Instead, it results in pointless >> restrictions while limiting organic evolution and outside contribution. The >> “formal process,” as you call it, is just another way of saying: we decide, >> you follow. And claims about protecting citizens often feel like a >> smokescreen to hide the unpleasant truth; ultimately damaging the EU itself >> and weakening its impact in the broader global ecosystem. >> >> >> On Mon, Feb 16, 2026 at 2:09 PM Steffen Schwalm <Steffen.Schwalm@msg.group> >> wrote: >> >> Filip, >> >> The issue is that W3C focus worldwide which not necessarily meet European >> specifics driven by European regulation. We have similar discussions in ISO >> but fully understand even China or Korea or Japan etc. that they sometimes >> define their own standards to meet regional legal and/or market >> requirements. >> >> As ETSI and CEN open for any company/individual there´s no process in the >> dark either - only more formal one. Personally I love the formal processes >> because they ensure equality for everybody but understand that they might >> be hated by other ones. >> >> I guess a closer collaboration between W3C and European SDO would benefit >> both communities. >> >> Best >> Steffen >> ------------------------------ >> *Von:* Filip Kolarik <filip26@gmail.com> >> *Gesendet:* Montag, 16. Februar 2026 13:59 >> *An:* Steffen Schwalm <Steffen.Schwalm@msg.group> >> *Cc:* Jori Lehtinen <lehtinenjori03@gmail.com>; Amir Hameed < >> amsaalegal@gmail.com>; NIKOLAOS FOTIOY <fotiou@aueb.gr>; Joe Andrieu < >> joe@legreq.com>; Kyle Den Hartog <kyle@pryvit.tech>; Adrian Gropper < >> agropper@healthurl.com>; Manu Sporny <msporny@digitalbazaar.com>; >> public-credentials <public-credentials@w3.org> >> *Betreff:* Re: Utah State-Endorsed Digital Identity (SEDI) legislation >> >> >> *Caution:* This email originated from outside of the organization. >> Despite an upstream security check of attachments and links by Microsoft >> Defender for Office, a residual risk always remains. Only open attachments >> and links from known and trusted senders. >> I think this thread is way off topic. It’s great to see such vibrant >> discussion about the EU vs. SEDI approach. One thing to note is that we are >> discussing this openly on a W3C forum, while all W3C specifications live >> openly on GitHub, where anyone can raise an issue or formally object, even >> without membership. There is nothing quite comparable to this in the EU >> process, and after all, W3C is an international consortium; it’s not a >> US-only standardization body. >> >> I’ve never understood the EU’s obsession with creating a copy of >> something just to have its “own” European version. It's always worse than >> the original and only emphasizes that there may be something fundamentally >> broken within the EU that prevents European individuals and companies from >> bringing something new and succeeding with it, rather than being forced to >> simply swallow and use what is produced in the dark in the EU. >> >> Best regards, >> Filip >> https://www.linkedin.com/in/filipkolarik/ >> >> On Mon, Feb 16, 2026 at 1:22 PM Steffen Schwalm <Steffen.Schwalm@msg.group> >> wrote: >> >> Recommend to look in the actual governance for the facts >> >> https://portal.etsi.org/Resources/ETSI-Directives >> >> https://boss.cen.eu/reference-material/refdocs/pages/ >> >> https://www.w3.org/membership/ >> >> If you can`t vote there`s no influence with impact possbile by design ;-) >> >> You can comment and send mail go mailinglist but you can`t take part in >> decision whether it´s recognized in standard or not. What`s commenting >> without decision making? >> >> So fully agree that more facts needed to proof your claims on QTSP - >> especially alongside the relevant mentioned standards >> >> Best >> Steffen >> ------------------------------ >> *Von:* Jori Lehtinen <lehtinenjori03@gmail.com> >> *Gesendet:* Montag, 16. Februar 2026 12:53 >> *Bis:* Steffen Schwalm <Steffen.Schwalm@msg.group> >> *Cc:* Amir Hameed <amsaalegal@gmail.com>; NIKOLAOS FOTIOY <fotiou@aueb.gr>; >> Joe Andrieu <joe@legreq.com>; Kyle Den Hartog <kyle@pryvit.tech>; Adrian >> Gropper <agropper@healthurl.com>; Manu Sporny <msporny@digitalbazaar.com>; >> Filip Kolarik <filip26@gmail.com>; public-credentials < >> public-credentials@w3.org> >> *Betreff:* Re: Utah State-Endorsed Digital Identity (SEDI) legislation >> >> *Caution:* This email originated from outside of the organization. >> Despite an upstream security check of attachments and links by Microsoft >> Defender for Office, a residual risk always remains. Only open attachments >> and links from known and trusted senders. >> I find artificial intelligence to be a useful work horse to find >> information to support facts and realities I intuitively know to be trough >> via my natural intelligence: >> ---------------------- >> >> Overall, Steffen’s paragraph is *mostly true in spirit* (I’d rate it ~ >> *0.7/1.0* on factual accuracy * even when I lean in his favor*), but it >> *overstates* a couple of things and *blurs* some important distinctions >> about *what “participation” means* and *what “open” means*. >> >> Here’s the claim-by-claim truth check. >> 1) “W3C requests membership of organization for formal participation in >> standardization” >> >> *Mostly true (with a key caveat).* >> >> - >> >> W3C membership is *organizational*, and W3C explicitly says it *does >> not have individual membership*. >> - >> >> But individuals can still participate *formally* in >> Recommendation-track groups as *Invited Experts* (with approval), so >> it’s not “membership or nothing.” >> >> ✅ *Steffen-favoring interpretation:* W3C’s *default* formal standards >> work is organization-centric, yes. >> 2) “Comment without voting rights is basically meaningless” >> >> *Not a factual claim; as a descriptive claim it’s mostly false.* >> >> W3C has multiple channels where non-members (or non-member-affiliated >> individuals) can influence outcomes: >> >> - >> >> *Community Groups* are open and *free* for anyone, and they >> frequently incubate work that later moves into the “formal” track. >> - >> >> Many W3C Working Groups run substantial technical work in public >> issue trackers and explicitly invite public input (even when meeting >> participation is limited). >> >> So: you might not get a vote, but *your technical input can absolutely >> matter* (especially if you bring tests, interoperable implementations, >> threat models, or sharp issue filings). >> >> ✅ *Steffen-favoring interpretation:* if he means “you don’t get formal >> decision rights,” then sure. But “meaningless” is vibes, not reality. >> 3) “ETSI requests membership of organization similar to W3C … membership >> fee required” >> >> *Mostly true.* >> >> - >> >> ETSI has *membership dues/contributions* (so “fee required” is >> broadly correct for membership). >> - >> >> ETSI membership is generally framed around *legal entities* committing >> to ETSI rules/directives (the academic summary states this explicitly). >> - >> >> ETSI presents itself as “open and inclusive,” but that’s about the >> environment/participation model—not “any random person can just vote in the >> room without joining.” >> >> ✅ *Steffen-favoring interpretation:* yes, both are membership-based for >> *formal* participation in the core standards machinery. >> 4) “EN are on public review … sometimes TS” >> >> *Plausible, but not established by the sources I pulled in this run.* >> >> I’m not comfortable stamping this “true” without pointing to ETSI’s own >> procedure text (e.g., ETSI Directives stages like public enquiry / >> commenting), and I didn’t capture that primary procedural document in the >> sources above. >> >> ✅ *Steffen-favoring interpretation:* likely broadly correct in many >> workflows, but *needs a clean ETSI process citation* to be nailed down. >> 5) “So basically both work similar … both are open SDO … since every >> organization can become member” >> >> *Partly true, but “open” is doing a lot of work here.* >> >> - >> >> W3C: “Organizations may join… processes designed for organizational >> participation.” Also explicitly: no individual membership class. >> - >> >> W3C: also has truly open lanes (Community Groups free; Business >> Groups have fees for non-members). >> - >> >> ETSI: membership is fee-based; and ETSI also enables “direct >> participation” compared to CEN/CENELEC’s national-body delegation model. >> >> So yes: both are “open” in the sense that *a wide range of organizations >> can join*. But they’re *not open in the same way* as a purely >> open-membership, no-fee, individual-driven process. >> >> ✅ *Steffen-favoring interpretation:* “open” as in *joinable by many orgs* and >> *outputs publicly visible*—fair. >> 6) “For individuals, CEN-CENELEC & ISO might be better… via National SDO” >> >> *Half-true (CEN/CENELEC part is supported; ISO part not verified here).* >> >> - >> >> CEN / CENELEC are described (accurately) as being structured around *national >> standards bodies as members*, which typically means individual >> participation is mediated through your country’s national body. >> - >> >> ISO is *very likely similar* (national member bodies), but I didn’t >> pull an ISO primary source in this run, so I won’t certify that part as >> “checked.” >> >> ✅ *Steffen-favoring interpretation:* directionally right—individuals >> often engage standards via national committees rather than paying into an >> org-membership consortium. >> 7) “All SDO work on consensus and controlled by an independent governance >> body… difference to DIF, OIDF” >> >> *Overbroad.* >> >> - >> >> “Consensus” is common, but *not universal* and not uniform (many >> bodies have formal voting stages, appeals, weighted votes, etc.). >> - >> >> “Independent governance body” varies a lot by org structure. >> >> And saying that’s the “main difference” vs DIF / OIDF is more *argument* than >> *fact*—those groups also have governance and decision processes; they’re >> just different kinds of institutions (often more >> industry-consortium/product-profile oriented). >> >> ✅ *Steffen-favoring interpretation:* he’s gesturing at the real >> difference between “recognized SDO/ESO-style standardization” vs “industry >> alliance profiles,” but the wording is too absolute. >> ------------------------------ >> Net verdict (Steffen-favoring) >> >> Steffen’s core comparison—*W3C and ETSI are both membership-based for >> formal standards decision-making, with public visibility and some public >> input channels*—is basically correct. >> >> The two biggest factual/structural corrections are: >> >> 1. >> >> “No vote = meaningless” is *not true* in practice (especially at W3C). >> 2. >> >> “All SDOs work on consensus” is *too sweeping* to be treated as >> factual. >> >> And one “needs citation” point: >> >> - >> >> ETSI “public review” details for EN/TS should be backed with ETSI’s >> own process text before you treat it as settled. >> >> If you want to sharpen this into a reply that’s hard to dodge, the killer >> move is to *separate*: >> >> - >> >> *Access to deliberation/decision rights* (membership/invited >> expert/etc.) >> - >> >> *Ability to influence outcomes* (public issues, CGs, public drafts, >> liaison input) >> >> That distinction stops the conversation from sliding into “open vs >> closed” as a single fuzzy blob, and forces everyone back onto concrete >> mechanics. >> ---------------------- >> source: https://chatgpt.com/share/6992f174-3578-8009-9422-4edaa93ecaa9 >> ---------------------- >> >> It is unproductive to utilize word semantics for misrepresenting reality. >> >> Can I hop on a ETSI mailing list and conversate with members that have >> voting power... NO >> >> I consider myself being able to participate in this debate a perfect >> example on what makes W3C NOT "work similar". >> >> >> I'm guilty of utilizing word semantics too, but try to admit when ever >> I'm caught or caught myself in the act. >> >> I admit that nothing I have presented yet provide an as comprehensive >> self-evident framework on how things should compared to what is described >> in the references you have shared regardless of the absolute correctness of >> the reference you have shared, they currently present an actual viable >> solution I have not presented in an evident way. >> >> I hope we can agree on the facts presented in the debate up to this >> point. And I will continue working on proper presentation material. >> >> Best, >> Jori >> >> >> >> ma 16.2.2026 klo 13.24 Steffen Schwalm (Steffen.Schwalm@msg.group) >> kirjoitti: >> >> Let´s trust on NI = natural intelligence >> >> >> - W3C requests membership of organization for formal participation in >> standardization >> - Comment without voting rights is basically meaningless in my opinion >> - Means formal standardization similar to ETSI witin a closed >> group (members with voting rights) >> - Membership fee for organizations required >> - ETSI requests membership of organization similar to W3C >> - EN are on public review, sometimes depending on process also TS >> - Formal standardization in closed group as well >> - Membership fee for organizations required >> >> >> So basically both work similar. As documents depending on governance >> published for comments or publicly available both are open SDO - especially >> since every organization can become member >> >> In case of individuals CEN-CENELEC & ISO might be better as any >> individual can be member via the National SDO and not bound to membership >> of an organization. >> >> All SDO work on consensus and controlled by an independent governance >> body. This is main difference to organizations like DIF, OIDF etc. >> >> >> >> >> ------------------------------ >> *Von:* Jori Lehtinen <lehtinenjori03@gmail.com> >> *Gesendet:* Montag, 16. Februar 2026 12:09 >> *Bis:* Steffen Schwalm <Steffen.Schwalm@msg.group> >> *Cc:* Amir Hameed <amsaalegal@gmail.com>; NIKOLAOS FOTIOY <fotiou@aueb.gr>; >> Joe Andrieu <joe@legreq.com>; Kyle Den Hartog <kyle@pryvit.tech>; Adrian >> Gropper <agropper@healthurl.com>; Manu Sporny <msporny@digitalbazaar.com>; >> Filip Kolarik <filip26@gmail.com>; public-credentials < >> public-credentials@w3.org> >> *Betreff:* Re: Utah State-Endorsed Digital Identity (SEDI) legislation >> >> *Caution:* This email originated from outside of the organization. >> Despite an upstream security check of attachments and links by Microsoft >> Defender for Office, a residual risk always remains. Only open attachments >> and links from known and trusted senders. >> > > ETSI is no legislation but SDO similar to W3C >> >> > I do not disagree with that statement on any level. >> >> I do not disagree that it is an Standards Development Organization that >> outputs technical specifications. >> >> But there is difference I think is worth pointing out in the context of >> the debate: >> >> AI GENERATED: >> >> *W3C model (open-collaboration culture)* >> >> - >> >> Public mailing lists, drafts, and discussions are often readable >> without membership. >> - >> >> Anyone can comment on specs. >> - >> >> Community Groups can be joined freely. >> - >> >> Formal voting requires membership, but influence can be built from >> outside. >> >> *ETSI model (formal standards institute)* >> >> - >> >> Participation in technical work is primarily for *members* (companies, >> orgs, some individuals). >> - >> >> Working Groups and Technical Committees are mostly restricted. >> - >> >> Many documents are public, but *draft discussions and decision-making >> are not*. >> - >> >> Membership fees are required for active participation. >> >> So structurally: >> >> W3C = open standards laboratory >> ETSI = regulated standards legislature >> >> Both produce specs, but their governance philosophy is different. ETSI >> exists inside a compliance-driven ecosystem (EU regulation, telecom, >> conformity assessment), so it’s intentionally more controlled. W3C grew out >> of web culture, which values rough consensus and public debate. >> >> ------- >> source: https://chatgpt.com/c/6992ee9d-4018-838a-80c8-15a29f9a0793 >> ------- >> >> ma 16.2.2026 klo 12.39 Jori Lehtinen (lehtinenjori03@gmail.com) >> kirjoitti: >> >> > ETSI is no legislation but SDO similar to W3C >> >> I do not disagree with that statement on any level. >> >> ma 16.2.2026 klo 12.38 Steffen Schwalm (Steffen.Schwalm@msg.group) >> kirjoitti: >> >> ETSI is no legislation but SDO similar to W3C >> ------------------------------ >> *Von:* Jori Lehtinen <lehtinenjori03@gmail.com> >> *Gesendet:* Montag, 16. Februar 2026 11:36 >> *An:* Steffen Schwalm <Steffen.Schwalm@msg.group> >> *Cc:* Amir Hameed <amsaalegal@gmail.com>; NIKOLAOS FOTIOY <fotiou@aueb.gr>; >> Joe Andrieu <joe@legreq.com>; Kyle Den Hartog <kyle@pryvit.tech>; Adrian >> Gropper <agropper@healthurl.com>; Manu Sporny <msporny@digitalbazaar.com>; >> Filip Kolarik <filip26@gmail.com>; public-credentials < >> public-credentials@w3.org> >> *Betreff:* Re: Utah State-Endorsed Digital Identity (SEDI) legislation >> >> >> *Caution:* This email originated from outside of the organization. >> Despite an upstream security check of attachments and links by Microsoft >> Defender for Office, a residual risk always remains. Only open attachments >> and links from known and trusted senders. >> > I reference to the standards determining QTSP issuing certificates in >> Europe - so technical requirements, not law. Any discussion should go >> alongside those standards to meet eiDAS >> >> >> Please quote me next time 😀: >> >> > But you keep throwing me legislation articles or technical >> specification sections >> >> ma 16.2.2026 klo 12.34 Steffen Schwalm (Steffen.Schwalm@msg.group) >> kirjoitti: >> >> Jori >> >> I reference to the standards determining QTSP issuing certificates in >> Europe - so technical requirements, not law. Any discussion should go >> alongside those standards to meet eiDAS >> >> Best >> Steffen >> ------------------------------ >> *Von:* Jori Lehtinen <lehtinenjori03@gmail.com> >> *Gesendet:* Montag, 16. Februar 2026 11:32 >> *An:* Steffen Schwalm <Steffen.Schwalm@msg.group> >> *Cc:* Amir Hameed <amsaalegal@gmail.com>; NIKOLAOS FOTIOY <fotiou@aueb.gr>; >> Joe Andrieu <joe@legreq.com>; Kyle Den Hartog <kyle@pryvit.tech>; Adrian >> Gropper <agropper@healthurl.com>; Manu Sporny <msporny@digitalbazaar.com>; >> Filip Kolarik <filip26@gmail.com>; public-credentials < >> public-credentials@w3.org> >> *Betreff:* Re: Utah State-Endorsed Digital Identity (SEDI) legislation >> >> >> *Caution:* This email originated from outside of the organization. >> Despite an upstream security check of attachments and links by Microsoft >> Defender for Office, a residual risk always remains. Only open attachments >> and links from known and trusted senders. >> Yeah, >> >> > You still claim subjects without making evident how it should work >> with a QSCD. Only subjects "I can" is bit too less. >> >> There is a massive difference in our approaches and I think it is good. >> >> I have been trying to say I need to take time to formalize an alternative >> model that makes things evident. >> >> But you keep throwing me legislation articles or technical specification >> sections. That in the context you present them seem attempts of denying >> physical reality with a definition or behaviour a law or specification >> hopes implementers follow. >> >> It is not like you are making it evident how the issues I point are >> addressed: >> Model used ChatGPT 5.2 Extended Thinking + Web Search. >> Convo: https://chatgpt.com/share/6992f174-3578-8009-9422-4edaa93ecaa9 >> ---------------------------------------------------------------- >> >> Here’s how Steffen Schwalm’s claims shake out *against the invariants >> you’re implicitly using* (authority decentralization + verifiability > >> “paper compliance”), with the *tightest EU-text anchors* we can point at. >> ------------------------------ >> 1) “Distributed” ≠ “consensus” (Steffen is basically right — but it >> dodges your actual point) >> >> Steffen’s pushback (“distributed systems don’t *require* consensus”) is >> correct as a *definition game*. Martin Kleppmann’s material makes the >> same separation: “distributed” just means multiple networked components >> coordinating; it doesn’t imply any particular convergence or byzantine >> fault tolerance property. >> >> But your invariant isn’t “is it distributed?” — it’s closer to: >> >> *If the verification-control-plane matters for citizens’ legal safety, no >> single governance domain should be able to unilaterally rewrite / suppress >> it without being cryptographically outvoted.* >> >> That property * does* require some kind of *multi-party replication + >> externally verifiable append-only-ness* (consensus, or >> CRDT-with-witnessing, or transparency logging, etc.). A plain “distributed >> publication system” doesn’t buy it. >> >> So: Steffen wins the dictionary point; you still win the >> *security-property* point. >> ------------------------------ >> 2) “250 QTSP / 31 TL / n CAB” is not protocol decentralization (your >> critique stands) >> >> The eIDAS trust backbone is explicitly a *directory + signatures + >> governance* control plane: >> >> - >> >> Member States publish *national trusted lists* in a >> machine-processable form. >> - >> >> The European Commission makes the “list of lists” information >> available (the EU-level aggregation/control plane). >> >> That is not a CRDT network of 250 QTSPs “keeping each other honest.” It’s *rooted >> authority per jurisdiction + a meta-directory*. >> >> So when Steffen says your earlier framing was wrong (“federated >> PKI/governance system”), he’s mostly just quibbling over the word >> *federated*. Functionally, it *is* “multi-root governance + published >> signed metadata,” not “multi-writer replicated state with convergence >> guarantees.” >> The clean invariant framing >> >> - >> >> *Market distribution:* many providers exist (250-ish QTSPs). >> - >> >> *Authority decentralization:* who can define “qualified” status is >> still centralized per Member State + EU-level aggregation mechanisms. >> >> Those are different axes. >> ------------------------------ >> 3) Supervisory body powers: Steffen’s correction is too narrow (and >> partially wrong) >> >> Steffen claimed (paraphrasing) “SB can request extraordinary audit by CAB >> after a breach; SB doesn’t audit itself.” >> >> But the consolidated eIDAS text says: >> >> - >> >> Trust service providers must notify breaches *within 24 hours* after >> becoming aware. >> - >> >> CAB-based conformity assessment is periodic (and the report is sent >> quickly). >> - >> >> *And* the supervisory body *“may at any time audit or request a >> conformity assessment body”* to assess a QTSP. >> >> So: >> >> - >> >> “Only after breach” is *too narrow*. >> - >> >> “SB does not audit” is *contradicted by the text* (“may at any time >> audit…”). >> >> ------------------------------ >> 4) “Remote signing breaks EU law” — that conclusion doesn’t follow (but >> your *structural* critique is valid) What the law *actually* asserts as >> the security invariant >> >> For advanced signatures, eIDAS requires signature creation under the >> signatory’s *sole control* (Article 26). >> Annex II requires signature-creation data be *reliably protected by the >> legitimate signatory against use by others*. >> >> That’s the “goal-shaped” wording you’re leaning on. >> What the system uses to justify meeting it (remote or local) >> >> The framework leans hard on *standards + certification + supervision + >> liability*, not on giving every relying party (or citizen) a >> cryptographic proof of what happened inside the QTSP. >> >> You can see the regulatory teeth in: >> >> - >> >> 24h breach notification, supervision, periodic assessments. >> >> And you can see the *technical* scaffolding for remote signing in the >> referenced standards ecosystem (activation protocols / remote QSCD >> requirements), e.g.: >> >> - >> >> ETSI TS 119 431-1 (signature activation protocol / SAD flows). >> - >> >> CEN 419 241 family / remote-signing protection profiles. >> - >> >> Supporting guidance from ENISA on remote signatures. >> >> So what’s the correct conclusion? >> >> - >> >> You *cannot* infer “implementations break EU law” merely from “remote >> signing has a logically imaginable malicious-QTSP threat model.” >> - >> >> You *can* correctly say: *remote signing makes “sole control” less >> directly verifiable by outsiders*, and the framework compensates with *institutional >> assurance* (certification, audits, supervision, liability), not >> “zero-trust cryptographic impossibility.” >> >> That’s a critique of the model’s *assurance philosophy*, not a proof of >> noncompliance. >> ------------------------------ >> 5) “QTSP can rewrite everything” vs “QTSP has no write access to >> everything” (both are overstated — the real point is *where the trust >> boundary is*) >> >> You said: QTSP has write access to auditing material ⇒ can fabricate >> history. >> Steffen replied: standards prevent that (citing ETSI EN 319 401 / EN 319 >> 411-1). >> >> What those standards families aim to do (at a high level) is: >> >> - >> >> force *separation of duties*, controlled admin access, >> - >> >> require *audit/event logging with integrity protections*, >> - >> >> ensure evidence is inspectable in conformity assessment. >> >> That makes “rewrite everything with zero chance of detection” a *harder* claim >> to sustain. >> >> But your deeper invariant still survives: >> >> If the only *authoritative* evidence of “user intent occurred” lives >> inside the same administrative domain that can trigger signing, then the >> relying party (and the user) ultimately depend on *institutional truth* when >> disputes happen. >> >> That’s exactly why your “verifiable receipt / user-retained artifact” >> line is such a strong move: it shifts the debate from vibes to *what >> does the citizen retain that doesn’t require trusting the QTSP’s internal >> story*. >> ------------------------------ >> 6) Nikos’s “we’re protecting the user, not verifiers” claim is >> *true-but-incomplete* >> >> The European Commission ENISA/ARF direction is explicitly >> privacy-preserving in ways that intentionally reduce “wallet >> fingerprinting.” Example: the ARF requirement that Wallet Unit Attestation >> is presented only during issuance flows (PID/attestation provider), *not* to >> relying parties. >> >> So Nikos is right that some mechanisms are designed to protect users and >> privacy even if that withholds signals from verifiers. >> >> But your counterpoint (“the user is also a verifier sometimes”) is >> aligned with the same architecture direction: users need to assess relying >> parties, consent, review logs, etc. That’s a “user as an active trust >> boundary” worldview, not “user as passive subject.” >> ------------------------------ >> 7) The sharpest “invariant-compatible” reply you can give Steffen >> (without overclaiming) >> >> If you want to keep it brutally technical and non-emotional, the best >> pivot is: >> >> 1. >> >> *Concede* the definitional point: distributed ≠ consensus. >> 2. >> >> *Restate* your invariant: you care about *authority decentralization >> + user-verifiable assurance*, not topology words. >> 3. >> >> *Ask* for the artifact: >> >> “In remote QES, what is the evaluated boundary that guarantees the QTSP >> cannot mint/replay SAD without the user — and what verifiable artifact can >> the user or relying party retain that proves that boundary was enforced for >> this specific signature event?” >> >> That question pins the debate to mechanisms, not “trust us, we’re >> audited.” >> ------------------------------ >> Bottom line verdict on Steffen’s claims >> >> - >> >> ✅ *Correct (but mostly semantic):* “distributed does not require >> consensus.” >> - >> >> ✅ *Correct:* trust lists + certificates + signature math are core >> pieces of the qualified validation story. >> - >> >> ❌ *Wrong / too narrow:* supervisory body powers are not “only after >> breach,” and SB *can* audit (text says “may at any time audit…”). >> - >> >> ⚠️ *Misframed:* “LOTL / EC can stop a national list” (maybe >> practically true via the control plane), but that actually *supports* your >> central-authority critique rather than refuting it. >> - >> >> ⚠️ *Not a refutation:* “if consensus algorithm flawed, replication >> won’t help” — true but symmetrical (if certification/audit regime flawed, >> governance won’t help either). It doesn’t defeat your “cryptographic >> verifiability beats institutional narration” invariant. >> >> ------------------------------ >> >> Reality check (with a wink): eIDAS is not “zero trust,” it’s “regulated >> trust.” Cryptography is the math of mistrust; regulation is the sociology >> of mistrust. The tension you’re surfacing is exactly where those two >> philosophies glare at each other across the room. >> --------------------------------------- >> >> *> Reality check (with a wink): eIDAS is not “zero trust,” it’s >> “regulated trust.” * >> This exactly issue everybody on this list is making... >> >> >> ma 16.2.2026 klo 12.17 Steffen Schwalm (Steffen.Schwalm@msg.group) >> kirjoitti: >> >> How you want to gues the right data without hacking whole QTSP infra? >> >> "If either the data transmitted from a user device and encrypted is not >> decrypted only at the hardware / firmware level" There are no data >> transferred to your mobile. >> >> "I can spoof or replay or hijack the SAD even in theory." how you plan >> to do this within the QSCD flawing which of the requirements I menioned and >> how? >> >> Even in decentralized model: >> >> >> - How you protect the keys in which environment, which hardware >> protected how? >> - How you ensure that your mobile is protected? Using which kind of >> hardware protection? How you plan to meet requirements from CEN EN 419 241 >> as this is requirements for QES acc. EIDAS Annex III >> >> >> So again without being impolite Jori: You still claim subjects without >> making evident how it should work with a QSCD. Only subjects "I can" is bit >> too less. >> >> >> ------------------------------ >> *Von:* Jori Lehtinen <lehtinenjori03@gmail.com> >> *Gesendet:* Montag, 16. Februar 2026 11:08 >> *Bis:* Steffen Schwalm <Steffen.Schwalm@msg.group> >> *Cc:* Amir Hameed <amsaalegal@gmail.com>; NIKOLAOS FOTIOY <fotiou@aueb.gr>; >> Joe Andrieu < <joe@legreq.com> >> >>
Received on Monday, 16 February 2026 14:16:18 UTC