{"id":751,"date":"2007-04-07T13:52:33","date_gmt":"2007-04-07T21:52:33","guid":{"rendered":"\/?p=751"},"modified":"2007-04-07T14:25:14","modified_gmt":"2007-04-07T22:25:14","slug":"digital-identity-allows-us-to-manage-risk-not-prove-anything","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=751","title":{"rendered":"Digital identity allows us to manage risk &#8211; not prove negatives"},"content":{"rendered":"<p>Jon&#39;s <a href=\"http:\/\/blog.jonudell.net\/2007\/04\/04\/history-or-technology-which-is-the-better-defense-of-identity-both\/\">piece<\/a>&nbsp;channeled below, &nbsp;<a href=\"http:\/\/www.tbray.org\/ongoing\/When\/200x\/2007\/04\/01\/You-Are-Your-Website\">Steven O&#39;Grady<\/a>&#8216;s comments&nbsp;at RedMonk&nbsp;and&nbsp; Tim O\u00e2\u20ac\u2122Reilly\u00e2\u20ac\u2122s <a href=\"http:\/\/radar.oreilly.com\/archives\/2007\/03\/call_for_a_blog_1.html\">Blogger&#39;s Code of Conduct<\/a>&nbsp; all say important things about the horrifying Kathy Sierra <a href=\"http:\/\/headrush.typepad.com\/creating_passionate_users\/2007\/03\/as_i_type_this_.html\" class=\"broken_link\">situation<\/a>.&nbsp;&nbsp; I agree with everyone that reputation is important, just as it is in the physical world.&nbsp; But I have a fair bit of trouble with some of the technical thinking involved.<\/p>\n<p>I agree we should&nbsp;be responsible for everything that appears on our sites <em>over which we have control<\/em>.&nbsp;&nbsp;&nbsp; And I agree that we should take all reasonable steps to&nbsp;ensure we control our systems as effectively as we can.&nbsp; But I&nbsp;think it is important for everyone to understand that&nbsp;<em>our starting point must be that&nbsp;every system can be breached<\/em>.&nbsp;&nbsp;Without such a point of departure, we&nbsp;will see&nbsp;further proliferation of&nbsp;Pollyannish systems that,&nbsp;as likely as not,&nbsp;end in regret.<\/p>\n<p><img align=\"right\" src=\"\/wp-content\/images\/2006\/08\/pinto-hack1.gif\" hspace=\"10\" \/>Once you understand the possibility of <strong>breach<\/strong>,&nbsp;you can calculate the&nbsp;associated risks,&nbsp;and build the technology that has the greatest chance of being safe.&nbsp; You can&#39;t do this if you don&#39;t understand the risks.&nbsp; In this sense, all you can do is manage your risk.<\/p>\n<p>When I first set up my blog to accept Information Cards, it prompted a number of people to try&nbsp;their hand&nbsp;at breaking in.&nbsp; They were unable to compromise the InfoCard system, but guess what?&nbsp; There was a security flaw in WordPress 2.0.1 that was&nbsp;exploited to <a href=\"\/?p=537\">post something in my name <\/a>.&nbsp;<\/p>\n<p>By what logic was I responsible for it?&nbsp; Because I chose to use WordPress &#8211; along with the other 900,000 people who&nbsp;had downloaded&nbsp;it and were thus&nbsp;open to this vulnerability?<\/p>\n<p>I guess, by this logic, I&nbsp;would also be responsible for any issues related to problems in the linux kernel operating underneath&nbsp;my blog;&nbsp;and for&nbsp; potential bugs in MySQL&nbsp;and PHP.&nbsp; Not to mention any improper behavior by those working at my hosting company or ISP.&nbsp;<\/p>\n<p>I&#39;m feeling much better now.<\/p>\n<p>So let&#39;s move on to the question of non-repudiation.&nbsp; There is no such thing as a provably correct system of any significant&nbsp;size.&nbsp; So there is no such thing as non-repudiation in an end-to-end sense.&nbsp; The fact that this term emerged from the world of PKI is yet another example of its failure to grasp various aspects of reality.<\/p>\n<p>There is no way to prove that a key has not been compromised &#8211; even if a fingerprint or other biometric&nbsp;is part of the equation.&nbsp; The sensors can be compromised, and the biometrics are publicly available&nbsp;information, not secrets.<\/p>\n<p>I&#39;m mystified by people who think cryptography can work &#8220;in reverse&#8221;.&nbsp; It can&#39;t.&nbsp; You can prove that someone has&nbsp;a key.&nbsp; You cannot prove&nbsp;that&nbsp;someone doesn&#39;t&nbsp;have a key.&nbsp; People who don&#39;t accept this&nbsp;belong in the ranks of those who&nbsp;believe in&nbsp;perpetual motion machines.<\/p>\n<p>To understand security, we have to leave the nice comfortable world&nbsp;of certainties and embrace uncertainty.&nbsp; We have to think in terms of&nbsp;probability and risk.&nbsp; We need structured ways to assess risk.&nbsp; And we then have to ask&nbsp;ourselves how to reduce risk.&nbsp;<\/p>\n<p>Even though I can&#39;t prove noone has stolen my key,&nbsp;I can protect things a lot more effectively by using a key than by using no key!&nbsp;<\/p>\n<p>Then, I can use a key that is hard to steal, not easy to steal.&nbsp;&nbsp;I can put the lock in the hands of trustworthy people.&nbsp;&nbsp; I can choose&nbsp;NOT to store valuable things that I don&#39;t need.&nbsp;<\/p>\n<p>And so, degree by degree, I can reduce my risk, and that of&nbsp;people around me.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Someone can prove they have a key.  Noone can prove someone doesn&#39;t have a key.<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[12,6,17,11],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/751"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=751"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/751\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=751"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=751"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=751"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}