{"id":651,"date":"2007-01-14T22:33:25","date_gmt":"2007-01-15T06:33:25","guid":{"rendered":"\/?p=651"},"modified":"2007-01-14T22:33:25","modified_gmt":"2007-01-15T06:33:25","slug":"resending-of-personal-data-with-infocards","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=651","title":{"rendered":"Resending of personal data with InfoCards"},"content":{"rendered":"<p><font size=\"2\">Eric Schultz writes with this question:&nbsp;<\/p>\n<blockquote><p>I&#39;ve been investigating CardSpace and the practicality of it&#39;s use for login on a new social networking site.<\/p>\n<p>I have a question regarding the method through which data is transferred. I see that you can require certain claims from an InfoCard such as email, first and last name, zip code etc. When I look at the login code I see that the same claims are required again.<\/p>\n<p>Does this mean that each time an InfoCard is sent all the personal data is resent? Isn&#39;t this dangerous for security\/privacy? The potential for a server failure (malicious or not) caused by a buffer overflow, a coding mistake that outputs the details of session variables etc. seems rather risky in this scenario.<\/p>\n<p>Perhaps I am being alarmist?<\/p><\/blockquote>\n<p>This is an area in which being &#8220;an alarmist&#8221; &#8211;&nbsp;perhaps I will rephrase it as&nbsp;being&nbsp;thoroughly pessimistic about what can go wrong &#8211; is the best starting point.&nbsp; You questions are ones everyone should think about.<\/p>\n<p><strong>InfoCard and Minimal Disclosure<\/strong><\/p>\n<p>The simple answer is that there is nothing built into InfoCard concepts that requires&nbsp;a &#8220;relying party&#8221;&nbsp;to ask for attributes every time a user comes to&nbsp;its site.&nbsp; Let&#39;s first look at the mechanics.&nbsp;<\/p>\n<p>The relying party controls what attributes it asks for by putting an&nbsp;OBJECT tag in the HTML page where the user opts to use an infocard.<\/p>\n<p><img src=\"\/wp-content\/images\/2007\/01\/object.jpg\" \/><\/p>\n<p>The example shown here will bring up&nbsp;the infocard dialog and illuminate any cards that offer all four claims so the user can select one.&nbsp;<\/p>\n<p>If, next time,&nbsp;the relying party&nbsp;doesn&#39;t want to receive these claims, it just doesn&#39;t ask for them.&nbsp;&nbsp;If it has stored them, it should be able to&nbsp;retrieve them when necessary by using &nbsp;&#8220;privatepersonalidentifier&#8221; as a handle.&nbsp;&nbsp;This identifier is&nbsp;just a random pairwise number meaningless to any other site, and so&nbsp;there is no identity risk in using it.<\/p>\n<p><strong>No theoretical bias<\/strong>&nbsp;<\/p>\n<p>In other words, the InfoCard&nbsp;system has no theoretical bias about what information should be asked for when.&nbsp; Through the Laws of Identity we have tried to help people understand that they should only ask for what they need to complete a transaction and should only keep it for the length of time they absolutely must.&nbsp;<\/p>\n<p>In particular, there should be no <strong><em>hoarding of rainy-day information<\/em><\/strong> &#8211; information that &#8220;might come in handy&#8221; some day &#8211; but which&nbsp;is more likely to&nbsp;turn into a liability than into a benefit.<\/p>\n<p><strong>Do your risk analysis<\/strong>&nbsp;<\/p>\n<p>You&#39;ll need to do the conventional risk analysis and think about whether it is more dangerous to store the information or just&nbsp;ask for&nbsp;it on an &#8220;as-needed&#8221; basis and then forget it.&nbsp; My&nbsp;personal sense is that&nbsp;it is more dangerous to store it than to use an on-demand approach.&nbsp;<\/p>\n<p>A&nbsp;central machine with&nbsp;the stored information that&nbsp;animates a successful internet business is a honeypot.&nbsp; It&nbsp;could well be&nbsp;subject to insider attacks, and certainly,&nbsp;since it&nbsp;lives on the internet, will be subject to&nbsp;many attacks on the information it stores.&nbsp; Why&nbsp;not avoid&nbsp;these problems completely?<\/p>\n<p>Certainly,&nbsp;the on-demand&nbsp;approach has benefits&nbsp;in convincing customers and&nbsp;legal practitioners&nbsp;that, having held no identity information, you cannot be seen as being responsible for an identity meltdown.&nbsp; To me this is very attractive, and something that has not been possible until now.<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>The examples Eric gives of things that can go wrong seem to me to apply even more strongly if you have stored information locally than if you ask for it on demand.<\/p>\n<p>But as I said earlier, this just expresses my thinking &#8211; there is lots more to be written by Eric and hundreds of others as they develop applications.&nbsp;<\/p>\n<p>Meanwhile, InfoCard has no built-in assumptions around this and can be used in whatever way is appropriate to a given situation.<\/p>\n<p>&nbsp;<\/p>\n<p><\/font><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What are the relative benefits and problems of storing people&#39;s personal information versus asking for it on demand?<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[16,2,14,11,4],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/651"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=651"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/651\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=651"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=651"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}