{"id":1028,"date":"2008-11-16T16:50:33","date_gmt":"2008-11-17T00:50:33","guid":{"rendered":"\/?p=1028"},"modified":"2008-11-16T17:01:13","modified_gmt":"2008-11-17T01:01:13","slug":"protecting-the-internet-through-minimal-disclosure","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=1028","title":{"rendered":"Protecting the Internet through minimal disclosure"},"content":{"rendered":"<p>Here&#39;s an email I received from John through my I-name account:<\/p>\n<p style=\"PADDING-LEFT: 30px\">I would have left a comment on the appropriate entry in your blog, but you&#39;ve locked it down and so I can&#39;t \ud83d\ude41<\/p>\n<p style=\"PADDING-LEFT: 30px\">I have a quick question about InfoCards that I&#39;ve been unable to find a clear answer to (no doubt due to my own lack of comprehension of the mountains of talk on this topic &#8212; although I&#39;m not ignorant, I&#39;ve been a software engineer for 25+ years, with a heavy focus on networking and cryptography), which is all the more pertinent with EquiFax&#39;s recent announcement of their own &#8220;card&#8221;.<\/p>\n<p style=\"PADDING-LEFT: 30px\">The problem is one of trust. None of the corporations in the ICF are ones that I consider trustworthy &#8212; and EquiFax perhaps least of all. So my question is &#8212; in a world where it&#39;s not possible to trust identity providers, how does the InfoCard scheme mitigate my risk in dealing with them? Specifically, the risk that my data will be misused by the providers?<\/p>\n<p style=\"PADDING-LEFT: 30px\">This is the single, biggest issue I have when it comes to the entire field of identity management, and my fear is that if these technologies actually do become implemented in a widespread way, they will become mandatory &#8212; much like they are to be able to comment on your blog &#8212; and people like me will end up being excluded from participating in the social cyberspace. I am already excluded from shopping at stores such as Safeway because I do not trust them enough to get an affinity card and am unwill to pay the outrageous markup they require if you don&#39;t.<\/p>\n<p style=\"PADDING-LEFT: 30px\">So, you can see how InfoCard (and similar schemes) terrify me. Even more than phishers. Please explain why I should not fear!<\/p>\n<p style=\"PADDING-LEFT: 30px\">Thank you for your time.<\/p>\n<p>There&#39;s a lot compressed into this note, and I&#39;m not sure I can respond to all of it in\u00a0one go.\u00a0 Before getting to the substantive points, I\u00a0want to make it clear that the only reason\u00a0identityblog.com <em>requires<\/em> people who leave a comment to use an\u00a0Information Card is\u00a0to give\u00a0them a feeling for one of the technologies I&#39;m\u00a0writing about.\u00a0\u00a0To quote\u00a0Don Quixote: &#8220;The proof of the pudding is the eating.&#8221;\u00a0 But now on to the main attraction.\u00a0<\/p>\n<p>It is\u00a0obvious,\u00a0and your reference to the members of the ICF illustrates this, that\u00a0every individual and organization\u00a0ultimately decides who or what to trust\u00a0for any given reason.\u00a0 Wanting to change this would be a non-starter.<\/p>\n<p>It is also obvious that in our\u00a0society, if someone offers a service,\u00a0it is their right\u00a0to establish the terms under which they do so (even requiring identification of various sorts).<\/p>\n<p>Yet to\u00a0achieve balance with the rights of others,\u00a0the legal systems of most countries also recognize\u00a0the need to limit this\u00a0right.\u00a0 One example would be\u00a0in\u00a0making it illegal to violate\u00a0basic human rights (for example, offering a service in a way that is discriminatory with respect to gender, race, etc).\u00a0<\/p>\n<p>Information Cards don&#39;t change anything in this\u00a0equation.\u00a0 They\u00a0replicate\u00a0what happens today in the physical world.\u00a0 The identity selector is no different than a wallet.\u00a0 The Information Cards are the same as the cards you carry in your wallet.\u00a0 The act of presenting them is no different than the act of presenting a credit card or photo id.\u00a0 The decision of\u00a0a merchant to require some form of identification is unchanged in the\u00a0proposed model.<\/p>\n<p><strong>But\u00a0is it necessary to\u00a0convey identity in the digital world?<\/strong><\/p>\n<p>Increasing population and density\u00a0in the digital world has led to the\u00a0embodiment\u00a0of greater material value there &#8211; a tendency\u00a0that will only become stronger.\u00a0 This\u00a0has\u00a0attracted more criminal activity and\u00a0if cyberspace\u00a0is denied any protective structure, this activity will become\u00a0disproportionately more pronounced as time goes on.\u00a0\u00a0If everything remains as it is, I don&#39;t find it very hard to\u00a0foresee an\u00a0Internet vulnerable enough to become almost useless.<\/p>\n<p>Many people have come or are coming to the conclusion that these dynamics\u00a0make it <strong>necessary<\/strong> to <strong>be able to\u00a0determine<\/strong> who we are dealing with in the digital realm.\u00a0 I&#39;m one of them.<\/p>\n<p>However, many also jump to the conclusion that if\u00a0reliable identification is necessary\u00a0for protection in\u00a0<strong>some<\/strong> contexts, it is necessary in <strong>all<\/strong> contexts.\u00a0 I do not follow that reasoning.\u00a0<\/p>\n<p><strong>Some != All<\/strong><\/p>\n<p>If\u00a0the &#8220;some == all&#8221; thinking predominates, one\u00a0is left with\u00a0a future where\u00a0people need to identify themselves to log onto the Internet, and their identity is automatically made available everywhere they go:\u00a0 ubiquitous identity in all contexts.<\/p>\n<p>I think the threats to the Internet and to society are sufficiently strong that in the absence of an alternate vision and understanding of the relevant pitfalls, this notion of a singular &#8220;tracking key&#8221; is likely to be widely mandated.<\/p>\n<p><em>This is as dangerous to the fabric and traditions of our society as the threats it attempts to counter.<\/em>\u00a0 It is a complete departure from the way things work in the physical world.<\/p>\n<p>For example, we don&#39;t need to present identification to walk down the street in the physical world.\u00a0 We don&#39;t walk around with\u00a0our names or\u00a0religions stenciled\u00a0on our backs.\u00a0 We show ID when we go to a bank or government office and want to get into our resources.\u00a0 We don&#39;t show it when we buy a book.\u00a0 We show a credit card when we make a purchase.\u00a0 My goal is to get to the same point in the digital world.<\/p>\n<p>Information Cards were intended to deliver\u00a0an <strong>alternate vision<\/strong> from that of a singular, ubiquitous identity.<\/p>\n<p><strong>New vision<\/strong><\/p>\n<p>This new vision is of\u00a0identity scoped to context, in which there is minimal disclosure of specific attributes necessary to a transaction.\u00a0 I&#39;ve discussed all of this <a href=\"https:\/\/www.identityblog.com\/stories\/2005\/05\/13\/TheLawsOfIdentity.pdf\">here<\/a>.\u00a0<\/p>\n<p>In this vision, many contexts require <strong>ZERO<\/strong> disclosure.\u00a0 That means\u00a0NO release of identity.\u00a0 In other words, what is released needs to be &#8220;proportionate&#8221; to specific requirements (I quote the Europeans).\u00a0\u00a0It is worth noting that in many countries these requirements are embodied in law and enforced.<\/p>\n<p><strong>Conclusions<\/strong><\/p>\n<p>So I encourage my reader to see Information Cards in the context of the\u00a0possible alternate futures\u00a0of identity on the Internet.\u00a0\u00a0I urge him to\u00a0take seriously the probability that deteriorating conditions on the internet will lead to\u00a0draconian\u00a0identity schemes\u00a0counter to western democratic traditions.<\/p>\n<p>Contrast this dystopia to what is achievable through Information Cards, and <em><strong>the very power of the idea\u00a0that identity is contextual<\/strong><\/em>.\u00a0 This itself can be the basis of many legal and social protections not otherwise possible.\u00a0<\/p>\n<p>It may\u00a0very\u00a0well be\u00a0that legislation will be required to ensure identity providers treat our information with sufficient care, providing individuals with\u00a0adequate control and respecting the requirements of minimal disclosure.\u00a0\u00a0I hope our blogosphere discussion can advance to the point\u00a0where we talk more concretely\u00a0about the kind of policy framework\u00a0required to accompany the technology we are building.\u00a0<\/p>\n<p>But the very basis of all these protections, and of the very possibility\u00a0of providing\u00a0protections in the first place,\u00a0depends on\u00a0gaining commitment to minimal disclosure and contextual identity as a fundamental alternative to far more nefarious alternatives &#8211; be they pirate-dominated chaos or draconian over-identification.\u00a0\u00a0I\u00a0hope we&#39;ll reach a point where no one\u00a0thinks about these matters absent the specter of such alternatives.<\/p>\n<p>Finally, in terms of the technology itself, we need to move towards the cryptographic systems developed by David Chaum, Stefan Brands and Jan Camenisch (zero knowledge proofs).\u00a0\u00a0\u00a0 Information Cards are an indispensible component required to make this possible.\u00a0 I&#39;ll also be discussing progress in this area more as we go forward.<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Being able to uniquely identify someone in some contexts does NOT mean we should have identification in all contexts! <\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[49,6,7,3,40,11],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/1028"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1028"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/1028\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1028"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1028"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1028"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}