- From: Mark Watson <watsonm@netflix.com>
- Date: Fri, 9 Nov 2012 18:29:23 +0000
- To: Thomas Hardjono <hardjono@MIT.EDU>
- CC: Wan-Teh Chang <wtc@google.com>, Seetharama Rao Durbha <S.Durbha@cablelabs.com>, "public-webcrypto@w3.org Group" <public-webcrypto@w3.org>
On Nov 9, 2012, at 10:14 AM, Thomas Hardjono wrote: > >> -----Original Message----- >> From: Mark Watson [mailto:watsonm@netflix.com] >> Sent: Thursday, November 08, 2012 3:23 PM >> To: Thomas Hardjono >> Cc: Wan-Teh Chang; Seetharama Rao Durbha; public-webcrypto@w3.org Group >> Subject: Re: Unique identifiers and WebCrypto >> >> >> On Nov 8, 2012, at 11:59 AM, Thomas Hardjono wrote: >> >>> >>>> -----Original Message----- >>>> From: Mark Watson [mailto:watsonm@netflix.com] >>>> Sent: Thursday, November 08, 2012 2:47 PM >>>> To: Wan-Teh Chang >>>> Cc: Thomas Hardjono; Seetharama Rao Durbha; public-webcrypto@w3.org >>>> Group >>>> Subject: Re: Unique identifiers and WebCrypto >>>> >>>> >>>> On Nov 8, 2012, at 11:34 AM, Wan-Teh Chang wrote: >>>> >>>>> On Thu, Nov 8, 2012 at 11:27 AM, Mark Watson <watsonm@netflix.com> >>>> wrote: >>>>>> >>>>>> My objective with the feature in question here is that the >>> privacy >>>>>> implications be no worse than (and hopefully better than) cookies >>>> and >>>>>> web storage. One aspect in which the situation is better is that >>>>>> users have very little idea what a site will use cookies and web >>>>>> storage for when they give permission. Giving a site permission >>> to >>>>>> access an (origin-specific) device identifier is arguably easier >>> to >>>>>> understand. >>>>> >>>>> If I understand it correctly, the perceived problem with an >>>>> origin-specific device identifier is that it is "read only" and >>>> cannot >>>>> be deleted by the user. >>>> >>>> Well, UAs may choose to allow users to delete the identifier. From >>> the >>>> site's point of view that's indistinguishable anyway from the site >>> not >>>> being authorized by the user to see it. The issue is that if you >>> delete >>>> such an identifier, services that need it may not work any more and >>>> users need to be warned about that. On a TV this would be a >>>> "permanently disable service X" button. Personally I would happily >>> use >>>> that feature on certain TV channels ;-) >>>> >>>>> >>>>> On the other hand, the user can effectively change the device >>>>> identifier by getting a new device, >>>> >>>> Depending on device implementation, it may be able to change its >>> device >>>> identifier at user request. >>>> >>>>> whereas an (origin-specific) user identifier, such as my Yahoo >>> Mail >>>>> account and Amazon.com account, usually last much longer than the >>>>> lifetime of a device. So it's not clear to me if a device >>> identifier >>>>> has more serious privacy issues. >>>>> >>>>> Wan-Teh >>> >>> I may be way off, but isn't this precisely the challenge of >>> privacy-preserving identity: >>> (a) how a user-selected identifier can be bound (unbound) by the user >>> to a service-issued identifier; >>> (b) how the user can select a new identifier and re-bound it to an >> old >>> service-issued identifier. >>> (c) how to do (a) and (b) with the assurance that neither the UA nor >>> the service is keeping track of the bindings. >> >> Are you suggesting that all identifiers should have the above >> properties ? Or just that we should make identifiers with these >> properties available to users and services ? >> >> If the former, how would you support a service which offered each >> person a one-off one-month free trial ? How would you detect fraud ? >> >> ...Mark > > > Hi Mark, > > The above (a)-(c) is seen from the perspective of the end-user (one who is assumed to be familiar with the notion of pseudonyms or anonyms). So its only one piece of the bigger picture. > > I believe the high-level model that some privacy-advocates may be open to, is the following (sorry its kinda long and rough): > > (1) I logon to the Identity Provider X (IdP-X) that I trust (eg. whose legal trust framework I accept and who in-turn is willing to take-on liabilities :) > > (2) I obtain a pseudonym identity from IdP-X (say JohnDoe[at]idpx.com) and a signed Assertion-X from IdP-X saying (i) that John Doe is a true human being as vouched by IdP-X and (ii) that he is over 18 yrs old. > > (3) I use that pseudonym (or my real identity) to logon to a Payment Provider Y (e.g. like a PayPal) and present it with Assertion-X. > > (4) I request the Payment Provider to issue an signed Assertion-Y that John Doe (the subject stated in Assertion-X) is committed to pay $7 per month to NetFlix for 1 year. If necessary the Payment Provider can act as an payment escrow. > > (5) I logon to NetFlix using the above pseudonym John Doe, and present NetFlix with both Assertion-X and Assertion-Y. > > (6) I agree to NetFlix's request to install a DRM-capable code/client (and key blobs) on my browser (or even in my OS) for the purposes of watching movies. > > (7) Optionally I may agree to NetFlix keeping track of my movie habits and send me marketing offers. > > > So from the above its necessary that all the players in the ecosystem need to agree upon some legal basis (so called legal "trust frameworks") so that one entity will accept signed assertions issued by another (and that those assertions will stand-up in court). > > ps. from the security and content-protection perspective, DRM is a necessary technology (apologies to anti-DRM folks). The key aspect is to mask away true identities via anonyms or pseudonyms, but allow vendors to provide services and even allow them to obtain my de-identified marketing data (either raw or aggregated). This is I guess a little off the original topic, but interesting none-the-less. My question was this: assume the above model, and note that Netflix does not require a 1-year commitment, or even a 1-month commitment, but just a verified method of payment, and we offer the first month free on a one-off basis to each person, and you may cancel at any time. Then, how do we detect free trial fraud ? i.e. when the same person comes back and asks for a free trail every month using a different pseudonym ? The above model assumes that an individual can repeatedly present themselves with a different pseudonym, with no way for the service provider to know it's the same individual (that's an explicit goal, right). That's incompatible with our current business practice where we ask people to provide some kind of (roughly) immutable identity in return for getting a free trial - it can be the payment method (credit card number) and it can also be their device identity if it has one. They do get something of real value in return for sacrificing their anonymity. Seems like a fair trade that the technology should support, no ? …Mark > > Again, sorry the above is long-winded. > > /thomas/ > > > > > > > >
Received on Friday, 9 November 2012 18:29:52 UTC