{"id":934,"date":"2008-03-06T08:03:33","date_gmt":"2008-03-06T16:03:33","guid":{"rendered":"\/?p=934"},"modified":"2008-03-06T12:47:06","modified_gmt":"2008-03-06T20:47:06","slug":"microsoft-to-adopt-stefan-brands-technology","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=934","title":{"rendered":"Microsoft to adopt Stefan Brands&#8217; Technology"},"content":{"rendered":"<p>The Internet may sometimes randomly &#8220;forget&#8221;.\u00a0 But in general it doesn&#39;t.\u00a0<\/p>\n<p>Once digital information is released to a\u00a0few parties, it really <em>is<\/em> &#8220;out there&#8221;.\u00a0 Cory Doctorow <a href=\"http:\/\/www.guardian.co.uk\/technology\/2008\/jan\/15\/data.security\">wrote\u00a0recently\u00a0<\/a>about what he called\u00a0<a href=\"\/?p=921\">the half-life<\/a>\u00a0of personal information, pointing out\u00a0that personal information doesn&#39;t just &#8220;dissipate&#8221; after use.\u00a0 It hangs around like radioactive waste.\u00a0 You can&#39;t just push a button and get rid of it.<\/p>\n<p>I personally think we are just beginning to understand what it would mean if everything we do is both remembered and automatically related to everything else we do.\u00a0 No evil &#8220;Dr. No&#8221; is necessary to bring this about, although evil actors might accelerate and take advantage of the outcome.\u00a0\u00a0Linkage is just a natural tendency of\u00a0digital reality, similar to entropy in the physical world.\u00a0 When designing phsyical systems\u00a0a big part of our job is countering entropy.\u00a0 And in the digital sphere,\u00a0our designs need to counter linkage.\u00a0<\/p>\n<p>This has led me to the idea of the &#8220;Need-to-Know Internet&#8221;.<\/p>\n<p><strong>The Need-to-Know Internet<\/strong><\/p>\n<p>&#8220;Need to Know&#8221; thinking\u00a0comes from the military.\u00a0 The precept is that if\u00a0people in dangerous situations\u00a0don&#39;t know\u00a0things <strong><em>they don&#39;t need to know<\/em><\/strong>, that information can&#39;t leak or be used in ways\u00a0that increase danger.\u00a0 Taken as a starting point, it leads to a safer environment.<\/p>\n<p>As Craig Burton pointed out many years ago, one key defining aspect of the Internet is that everything is equidistant from everything else.\u00a0<\/p>\n<p>That means we\u00a0can get easily to the most obscure possible resources, which makes\u00a0the Internet\u00a0fantastic.\u00a0 But\u00a0it also means\u00a0unknown\u00a0&#8220;enemies&#8221; are as &#8220;close&#8221; to us as our &#8220;friends&#8221; &#8211; just a packet away.\u00a0 If something is just a packet away, you can&#39;t see it coming, or prepare for it.\u00a0 This aspect of digital\u00a0&#8220;physics&#8221;\u00a0is one of the main reasons the Internet can be a dangerous place.<\/p>\n<p>That danger can be addressed by adopting a need-to-know approach to the Internet.\u00a0 As little personal information as possible should be released, and to the smallest possible number of parties.\u00a0 Architecturally, our infrastructure should lead naturally to this outcome.<!--more--><\/p>\n<p><strong>Need-to-Know and Minimal Disclosure<\/strong><\/p>\n<p>CardSpace is an important\u00a0step in this direction &#8211; offering much less visibility of identity providers onto users&#8217; activities than &#8220;redirection protocols&#8221; like SAML WS-Federation and OpenID, which reveal the DNS names of all the sites you employ,\u00a0continuously, in real time.\u00a0 On the contrary, when using self-issued cards,\u00a0CardSpace transmits no\u00a0linking artifacts that allow one party to collude with another about your identity.<img border=\"0\" vspace=\"30\" align=\"right\" src=\"\/wp-content\/images\/2008\/03\/linkage-4.jpg\" hspace=\"10\" \/><\/p>\n<p>However, with managed cards carrying claims asserted by a third party authority, it\u00a0has\u00a0so far been\u00a0impossible, even for CardSpace, to completely avoid artifacts that allow linkage. (I&#39;ve treated\u00a0these issues in depth\u00a0in\u00a0my\u00a0<a href=\"https:\/\/www.identityblog.com\/?cat=47\">Series on Linkage<\/a>.)\u00a0 Though relying parties are not able to collude with\u00a0one another, if they collude with the identity provider, a set of claims can be linked to a given user even if they contain no obvious\u00a0linking information.<\/p>\n<p>The\u00a0reason is that to\u00a0prevent a\u00a0set of claims from being\u00a0shared and replayed,\u00a0we need an identifier and\/or\u00a0&#8220;proof key&#8221; in it.\u00a0 The authority then needs to <em>sign the identifier and key<\/em> as well as the claims.\u00a0<\/p>\n<p>With conventional (e.g. RSA) technology, any set of claims presented to a site will have the signature\u00a0present, and so can potentially be traced back to a given authentication and token issuance.\u00a0If\u00a0a relying party is willing to take\u00a0its claimset\u00a0to the identity provider, and the identity provider is willing to investigate, the colluding duo can figure out which user presented which set of claims<\/p>\n<p><strong>Magic Signatures?<\/strong><\/p>\n<p>But there is good news.\u00a0 Minimal disclosure technology allows the identity provider to sign the token and proof key in such a way that the user can prove the claims come legitimately from the identity provider\u00a0without revealing the signature applied by the identity provider.\u00a0<\/p>\n<p>I&#39;ve tried to represent that in the diagram where the set of claims &#8216;C&#8217; has a &#8220;green signature&#8221; applied by the issuer, but what is conveyed to the relying party is a proof (&#8220;blue signature&#8221;) that doesn&#39;t reveal the green signature.\u00a0<\/p>\n<p>If the\u00a0relying party takes the &#8220;proof&#8221; back to the issuer, the issuer won&#39;t recognize it, because all it knows about is the &#8220;green signature&#8221;.\u00a0 So it can&#39;t be linked to specific user unless\u00a0the claims themselves\u00a0contains overt identifying information.\u00a0 In other words, <em>no linking artifacts<\/em>.<\/p>\n<p><strong>The RSA of Privacy<\/strong><\/p>\n<p><a href=\"http:\/\/www.idcorner.org\/\" class=\"broken_link\">Stefan Brands<\/a> has been working on\u00a0this minimal disclosure technology since the early 1990&#8217;s.\u00a0 As I&#39;ve said on many occasions, his system is incredibly well thought through and elegant.\u00a0\u00a0The explanation I&#39;ve just given touches on only one aspect of a really impressive technology grounded in innovative cryptography (more information on the <a href=\"http:\/\/www.credentica.com\">Credentica<\/a> web site).<\/p>\n<p>In my view, Stefan&#39;s technology, called &#8220;U-Prove&#8221;, is the equivalent in the privacy world of RSA in the security space.\u00a0 It does things we wouldn&#39;t have otherwise thought possible.\u00a0 At one time &#8220;public key&#8221; was\u00a0considered an oxymoron &#8211; but the properties of RSA were so compelling they completely changed our thinking about keys.\u00a0<\/p>\n<p>The same, I think, is true of the zero knowledge proofs and &#8220;blinded signatures&#8221; Stefan has perfected.\u00a0 When you first hear about their capabilities, you say, &#8220;Well, that&#39;s impossible&#8221;.\u00a0 But if you look into the math, its not.\u00a0 It actually works.<\/p>\n<p>Funny.\u00a0\u00a0A few weeks ago, <a href=\"http:\/\/www.schneier.com\/blog\/archives\/2008\/02\/credentica.html\">Bruce Schneier wrote a brief blog post <\/a>saying:<\/p>\n<blockquote><p>&#8220;Cryptographer Stefan Brands has a new company, <a href=\"http:\/\/www.credentica.com\/\">Credentica<\/a>, that <a href=\"http:\/\/www.wired.com\/politics\/security\/news\/2008\/02\/credentica\" class=\"broken_link\">allows people<\/a> to disclose personal information while maintaining privacy and minimizing the threat of identity theft.<\/p>\n<p>&#8220;I know Stefan; he&#39;s good. The cryptography behind this system is almost certainly impeccable. I like systems like this, and I want them to succeed. I just don&#39;t see a viable business model.<\/p>\n<p>&#8220;I&#39;d like to be proven wrong.&#8221;<\/p><\/blockquote>\n<p>I\u00a0think\u00a0Microsoft&#39;s acquisition of Stefan&#39;s technology and patents\u00a0does prove him wrong &#8211; and that he&#39;ll be\u00a0happy about this.<\/p>\n<p>Our goal is that Minimal Disclosure Tokens\u00a0will become base features of identity platforms and products, leading to the safest possible intenet.\u00a0\u00a0I don&#39;t think the point here is\u00a0ultimately\u00a0to make a dollar.\u00a0 It&#39;s about building a system of identity that can withstand the ravages that the Internet will unleash. That will be worth billions.<\/p>\n<p>My interest is in\u00a0building the very best identity system we can build, and making\u00a0it a simple option for people to deploy, so that\u00a0the binary opposition of &#8220;privacy&#8221; and &#8220;security&#8221; is replaced by a deep understand that &#8220;need-to-know&#8221; and minimal disclosure produces both the most secure and the most privacy friendly Internet.<\/p>\n<p><strong>Products and Roadmaps<\/strong><\/p>\n<p>\u00a0It is\u00a0really early in the cycle for us to have worked out a roadmap.\u00a0 Getting the right user experience to accompany capabilities like this is not trivial.\u00a0 But our plan is to integrate U-Prove into both the Windows Communication Foundation (WCF)\u00a0and CardSpace.\u00a0\u00a0When that happens, all products built on the WCF Framework will easily support U-Prove.\u00a0 That would include our own servers as well as those by third parties.<\/p>\n<p>As always, adopting U-Prove doesn&#39;t mean we reject other identity technologies.\u00a0 No one is going to take away your RSA keys!\u00a0 It means there is a new option available in building the identity metasystem, an option that is ideal for Government and\u00a0medical applications,\u00a0child protection, military systems,\u00a0and\u00a0identity outsourcing\u00a0to\u00a0name just a few.\u00a0\u00a0 The idea is that we need a spectrum of solutions, reaching all the way from systems for public and social networking\u00a0identity to those for sensitive information where need-to-know is\u00a0the key factor.<\/p>\n<p><em>You can probably tell how excited I am about this.<\/em>\u00a0 I want to thank the people within Microsoft who made this possible by agreeing to take\u00a0the\u00a0plunge that will\u00a0bring\u00a0ground-breaking privacy\u00a0technology to the market.<\/p>\n<p>Best of all, I look forward to the great things the collaboration with Stefan, Christian and Greg can bring, and the fun we will have building the\u00a0most secure identity system possible while at the same time taking privacy protection to whole new levels.<\/p>\n<p>For more information, check out <a href=\"http:\/\/www.idcorner.org\/\" class=\"broken_link\">Stefan&#39;s blog<\/a>.\u00a0 You should also\u00a0look at \u00a0<a href=\"https:\/\/blogs.technet.com\/privacyimperative\">PrivacyImperative<\/a>\u00a0to\u00a0see the perspective of my colleagues from the Microsoft Privacy Team.\u00a0 Adam Shostack, who worked closely with Stefan at Zero Knowledge in Montreal, comments <a href=\"http:\/\/www.emergentchaos.com\/archives\/2008\/03\/microsoft_acquires_creden.html\" class=\"broken_link\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Stefan and his colleagues Christian Paquin and Greg Thompson have joined the Identity and Access Group at Microsoft<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[49,16,37,2,8,7,47,40,11],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/934"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=934"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/934\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=934"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=934"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}