- From: Thi Nguyen-Huu <thi.nh@winmagic.com>
- Date: Mon, 11 Aug 2025 22:43:27 +0000
- To: "support@ietf.org" <support@ietf.org>, "public-webauthn@w3.org" <public-webauthn@w3.org>
- CC: Sergei Nikitin <sergei.nikitin@winmagic.com>
- Message-ID: <YT1PR01MB24091310A8DD90788E3646E4F928A@YT1PR01MB2409.CANPRD01.PROD.OUTLOOK.COM>
Subject: Proposal for Discussion: The Secure Internet – Embedding Trust into the Protocol Layer Dear IETF and W3C Working Group Members, I’m writing to propose a discussion around a new architectural model we call The Secure Internet—a vision that reimagines how identity and trust are established online by embedding them directly into the transport layer. At the core of this model is a cryptographic identity signal called the Live Key, derived from the user presence, security posture and anchored in TPM hardware. This signal is long-lived, non-exportable, and accessible only when specific security conditions are met—such as active user’s OS login, full disk encryption, and up-to-date system patches. These conditions are policy-defined, allowing organizations to enforce dynamic, context-aware trust requirements beyond simple user presence. Furthermore, the Live Key enables mutual TLS (mTLS) without requiring client-side certificates. Instead, the client registers its Live Key directly with the server, similar to the FIDO model. This simplifies trust establishment, eliminates the need for certificate authorities, and enables personalized, cryptographically assured sessions. The Secure Internet aligns with the goals of both TLS and WebAuthn/FIDO2: * It complements mTLS by enabling certificate-less client authentication. * It enhances FIDO2 and Passkeys by offering a transport-level trust mechanism that can eliminate user interaction and additional policy-defined signals check while maintaining strong assurance. * It inherently satisfies and exceeds NIST FAL3-level assurance without tokens, or channel binding. The architecture can eliminate the need for federated authentication entirely. In this model, the identity provider (IdP) evolves into a real-time, CA-like trust authority—capable of informing the relying party (service provider) when a previously registered public key is no longer trusted. Importantly, this model does not require changes to existing standards—at least not initially. It builds on them, offering a new way to express identity and trust natively within the protocol layer. In the future, optional client certificates may be considered as part of evolving standards. We believe this approach could be of interest to working groups focused on TLS, OAuth, WebAuthn, and identity federation. We would welcome the opportunity to present this concept, share open specifications, and explore how it might align with ongoing efforts across both IETF and W3C. Thank you for your consideration. PS. The same text is in the attachment. And for more info on our website please visit: https://winmagic.com/en/secure_internet/ Sincerely, Thi Nguyen-Huu | CEO Tel: +1 905.502.7000 x 3288 | Toll Free: 888.879.5879 thi.nh@winmagic.com<mailto:thi.nh@winmagic.com> | www.winmagic.com<http://www.winmagic.com/> WinMagic Corp. | 11-80 Galaxy Blvd. Toronto, ON | M9W 4Y8 | Canada | www.winmagic.com<http://www.winmagic.com/> [cid:image001.png@01DC0AEF.D1BC6AC0]<http://www.facebook.com/WinMagicInc> [cid:image002.png@01DC0AEF.D1BC6AC0] <https://twitter.com/winmagic> [cid:image003.png@01DC0AEF.D1BC6AC0] <http://www.linkedin.com/company/winmagic> [cid:image004.png@01DC0AEF.D1BC6AC0] <https://www.winmagic.com/blog/> [A person holding a phone and typing on a computer AI-generated content may be incorrect.]<https://winmagic.com/en/secure_internet/>
Attachments
- image/png attachment: image001.png
- image/png attachment: image002.png
- image/png attachment: image003.png
- image/png attachment: image004.png
- image/png attachment: image005.png
- application/vnd.openxmlformats-officedocument.wordprocessingml.document attachment: Letter_Secure_Internet_IETF_W3C.docx
Received on Tuesday, 12 August 2025 07:03:46 UTC