diff --git a/index.html b/index.html index e2db4bf..d3f97df 100644 --- a/index.html +++ b/index.html @@ -785,14 +785,14 @@
2.3.3.2. Security and Privacy
-

It is interesting reflect on how this model differs from a security and privacy perspective both from previously described models and from the use of physical identity documents, as credentials can enable this use case:

+

It is interesting to reflect on how this model differs from a security and privacy perspective both from previously described models and from the use of physical identity documents, as credentials can enable this use case:

Note: Architectural change can solve some issues but can also generate new ones, this is why a thorough analysis is necessary.

We can take a step back and understand what privacy properties are needed for digital identity, considering that the higher the level of credential assurance, the more threats can impact the user. Over the years, several proposals have been made to understand the properties of digital identities, such as Kim Cameron’s 7 Identity Laws and Ben Laure’s Three Properties. Analyzing the latter [selective-disclosure]:

@@ -800,16 +800,16 @@

Verifiable: Identities, credentials, and various claims must be verifiable, which is possible through appropriate cryptographic proofs. This is part of the security aspects, which include cryptography.

  • -

    Minimal: This is a privacy aspect. When we send information to the verifier, the information should be minimized as much as possible. For example, if we have to show that we are of age, it is okay to submit all the credentials or even the specific claim of the date of birth, but simply that I am of age.

    +

    Minimal: This is a privacy aspect. When we send information to the verifier, the information should be minimized as much as possible. For example, if I have to show that I am of age, it is okay to submit all the credentials or even the specific claim of my date of birth, but simply that I am of age.

  • Unlinkable: This is another privacy aspect related to the minimal issue anyway. Suppose any party involved in the interaction, such as the Issuer or Verifier, or even a third party, can link and correlate the information we have sent. In that case, this can be done through various techniques, and privacy is compromised.

    So we have a number of properties, both security and privacy as a starting point. How can we implement them? First of all, different credential formats, have different privacy and security features [verifiable-credentials-flavors-explained] and we can expand the discussion not only to formats but to all other components of the architecture, which must be aligned to ensure security and privacy.

    - Modeling Security, Privacy, and Human Rights Threats of Decentralized Credentials
    + Modeling security, privacy, and human rights threats of decentralized credentials

    Given the levels of complexity, a comprehensive analysis of threats to privacy, security, and human rights is necessary.

    -

    This is especially important for high-assurance credentials, such as those issued by governments. This is highlighted by organizations such as the Electronic Frontier Foundation (EFF)[eff-digital-identification] and Access Now [access-now-whyid].

    -

    W3C recognized the need for rights-respecting digital credentials and started a joint Threat Model for Decentralized Identities:

    +

    This is especially important for high-assurance credentials, such as those issued by governments. This is highlighted by organizations such as the Electronic Frontier Foundation (EFF) [eff-digital-identification] and Access Now [access-now-whyid].

    +

    W3C recognized the need for rights-respecting digital credentials and started a joint Threat Model for Decentralized Identities with the following groups:

    Threat Modeling is "a family of structured, repeatable processes that allows to make rational decisions to secure applications, software, and systems" [threat-modeling-designing-for-security]. This Threat Model is using different frameworks and toolkits to cover the different threat types, such as:

      @@ -831,44 +831,45 @@

      Privacy: LINNDUN (Linking, Identifying, Non-Repudiation, Detecting, Data Disclosure, Unawareness & Inintervenability, Non-Compliance), RFC 6973.

    • -

      Human Rights: Microsoft’s Types of Harm, and Access Now #WhyID.

      +

      Human rights: Microsoft’s Types of Harm, and Access Now #WhyID.

    - Other approaches includes the Self-Review Questionnaire: Security and Privacy and the OSSTMM. + Other approaches includes the Self-Review Questionnaire: Security and Privacy and the OSSTMM.

    The Threat Model also includes a list of various mitigation techniques, particularly those based on cryptography techniques such as Zero Knowledge Proof (ZKP), and additional methods for enabling secure and privacy-preserving technology.

    2.3.3.3. Standards
    -

    As noted, VCDM and DID define only certain elements of the architecture. Other SDOs define other elements that are essential for the architecture to function. +

    As noted, VCDM and DID define only certain elements of the architecture. Other Standards Development Organizations (SDOs) define other elements that are essential for the architecture to function. Therefore, coordination between these entities is necessary to ensure everything works seamlessly. So, let us look at the standards involved for the various components needed.

    To understand the extent of the various standards, is it possible to refer to Michael Palage’s Digital Identity Galaxy.

    -

    This is why several Standards Development Organizations (SDOs) such as the World Wide Web Consortium (W3C), the Internet Engineering Task Force (IETF), the OpenID Foundation (OIDF), and the Decentralized Identity Foundation (DIF) are coordinating to standardize the components and how they should communicate:

    +

    This is why several SDOs such as the World Wide Web Consortium (W3C), the Internet Engineering Task Force (IETF), the OpenID Foundation (OIDF), and the Decentralized Identity Foundation (DIF) are coordinating to standardize the components and how they should communicate:

    • -

      Data Models: abstract models for Credentials and Presentation such as the Verifiable Credentials Data Model, and mDL in ISO/IEC 18013-5:2021.

      +

      Data models: abstract models for Credentials and Presentation such as the Verifiable Credentials Data Model, and mDL in ISO/IEC 18013-5:2021.

    • Identifiers: DIDs and the DID methods, or WebID.

    • -

      Encoding Schemas: JSON, JSON-LD, CBOR, CBOR-LD.

      +

      Encoding schemas: JSON, JSON-LD, CBOR, CBOR-LD.

    • -

      Securing Mechanisms: Each mechanism may or may not support different privacy features or be quantum-resistant:

      +

      Securing mechanisms: Each mechanism may or may not support different privacy features or be quantum-resistant:

      • -

        Enveloped Formats (Credential Formats): The proof wraps around the serialization of the credential. +

        Enveloped formats (credential formats): The proof wraps around the serialization of the credential. JSONs are enveloped using JSON Object Signing and Encryption (JOSE), and we can find JWT, JWS, and JWK here. JOSE is cryptographically agile (as it can fit different cryptographic primitives) and can also have Selective Disclosure (SD) with SD-JWT (which uses HMAC). New securing mechanisms are coming up, like SD-BLS (which uses BLS) and ongoing efforts to fit BBS#. CBORs are enveloped using CBOR Object Signing and Encryption (COSE). Other formats include mdoc and SPICE. The mechanism to use VCDM with JOSE/COSE is described in Securing Verifiable Credentials using JOSE and COSE.

      • -

        Embedded Formats (Signature Algorithms): The proof is included in the serialization alongside the credentials (e.g., BBS, ECDSA, EdDSA). The mechanism is described in Verifiable Credential Data Integrity 1.0.

        +

        Embedded formats (signature algorithms): The proof is included in the serialization alongside the credentials (e.g., BBS, ECDSA, EdDSA). The mechanism is described in Verifiable Credential Data Integrity 1.0.

    • -

      Status Information (Revocation Algorithms): Issuers can implement several ways to keep the credential’s status up to date, such as a Revocation List, a Status List (e.g., Bitstring Status List v1.0), and Cryptographic Accumulators, etc..

      +

      Status information (revocation algorithms): Issuers can implement several ways to keep the credential’s status up to date, such as a Revocation List, a Status List (e.g., Bitstring Status List v1.0), and Cryptographic Accumulators, etc.

    • -

      Communication Protocols: for the different phases of Issuance and Presentation (e.g., OID4VCI, OID4VP, SIOPv2).

      +

      Communication protocols: for the different phases of issuance and presentation (e.g., OID4VCI, OID4VP, SIOPv2).

    -

    Note: This list is representative. For more detailed information, please refer to the Comparison Matrix.

    +

    Note: This list is representative. For more detailed information, please refer to the comparison matrix.

    Avoiding discrimination by standardizing interoperability

    One of the significant challenges today is the interoperability of various technologies. This issue becomes particularly evident in the context of government-issued digital credentials when comparing the interoperability of physical documents such as Passports.

    -

    The threat here is clear: if a service supports only a specific format, it excludes and discriminates against users who use a different format due to their government’s decisions rather than their own. Consequently, this limitation affects users and restricts the service’s business potential.

    +

    The threat here is clear: if a service supports only a specific format, it excludes and discriminates against users who use a different format due to their government’s decisions. Consequently, this limitation affects users and restricts the service’s business potential.

    To address these concerns, there are ongoing discussions about standardizing credential presentation at the web platform level through the Digital Credentials API. The Working Group already on the Federated Identity Model is undertaking this standardization effort as the API is similar. The goal is to provide an optimal user experience by ensuring user agents operate securely and in privacy-preserving ways.

    Moreover, the Group’s new scope proposal aims to adopt this API with a broader perspective. It suggests incorporating the "Issuance" aspect to enable all possible use cases through the web platform.