and categories; • Walk you through what a layered conceptual model for identity could be like; • Talk about the privacy implications for how we go about implementing things; • Hopefully convince you that the closer to the edge we process things, the better it is for the user… • … but that the edge does not guarantee privacy. Goals!
Crocker (BBW) •Wesley Dunnington (Ping Identity) •Jacoby Thwaites (OnFido) •PG, DJ, AL (*) Work in progress… Samsung NEXT Internet Identity Workshop XXVIII * Didn’t hear back about naming them. Privacy and GDPR, y’all!
information, such as: • Your name… • Username/password pairs… • Shipping addresses… • Phone and passport numbers. • Facts are involved in verification and authentication. Facts
be scried from the data exhaust: • Personal interests, tastes, habits; • What you avoid; • How you react to things; • Can change through the years; Characteristics are unstructured
system-level flows that involve identities and other systems Sign-in account recovery, payment, wallet app on smartphone 6 Workflow Protocol flows between connected identities only (external choreography) DID routing (cf. Sam's talk), REST over TCP/IP, SMS & associated data formats/ encryption 5 Transaction How runtime capabilities of an identity are defined and invoked (internal orchestration) Retrieval of attributes including PII, derived PII and their computation, attestations, plug-in capabilities 4 Connection How identities accept connections from other identities and systems Evernym wallet connection with verifier, REST endpoint, DNS janedoe.me 3 Reference How an identity is referenced externally [email protected], did:foo:bar, +1650112332, Evernym connection, QR Code 2 Validation What trust system validates an identity ICANN, Bitcoin, PKI, self-signed certs 1 Storage The de minimis form of an identity that means it exists A blockchain entry, disk connected to a virtual server, a database record on the cloud or a smartphone, a DID record * WIP. Created during two sessions at the MV Internet Identity Workshop, May 2019 7-Layer Conceptual Model of Identity*
system-level flows that involve identities and other systems Sign-in account recovery, payment, wallet app on smartphone 6 Workflow Protocol flows between connected identities only (external choreography) DID routing (cf. Sam's talk), REST over TCP/IP, SMS & associated data formats/ encryption 5 Transaction How runtime capabilities of an identity are defined and invoked (internal orchestration) Retrieval of attributes including PII, derived PII and their computation, attestations, plug-in capabilities 4 Connection How identities accept connections from other identities and systems Evernym wallet connection with verifier, REST endpoint, DNS janedoe.me 3 Reference How an identity is referenced externally [email protected], did:foo:bar, +1650112332, Evernym connection, QR Code 2 Validation What trust system validates an identity ICANN, Bitcoin, PKI, self-signed certs 1 Storage The de minimis form of an identity that means it exists A blockchain entry, disk connected to a virtual server, a database record on the cloud or a smartphone, a DID record 7-Layer Conceptual Model of Identity* * WIP. Created during two sessions at the MV Internet Identity Workshop, May 2019
system-level flows that involve identities and other systems Sign-in account recovery, payment, wallet app on smartphone 6 Workflow Protocol flows between connected identities only (external choreography) DID routing (cf. Sam's talk), REST over TCP/IP, SMS & associated data formats/ encryption 5 Transaction How runtime capabilities of an identity are defined and invoked (internal orchestration) Retrieval of attributes including PII, derived PII and their computation, attestations, plug-in capabilities 4 Connection How identities accept connections from other identities and systems Evernym wallet connection with verifier, REST endpoint, DNS janedoe.me 3 Reference How an identity is referenced externally [email protected], did:foo:bar, +1650112332, Evernym connection, QR Code 2 Validation What trust system validates an identity ICANN, Bitcoin, PKI, self-signed certs 1 Storage The de minimis form of an identity that means it exists A blockchain entry, disk connected to a virtual server, a database record on the cloud or a smartphone, a DID record 7-Layer Conceptual Model of Identity* * WIP. Created during two sessions at the MV Internet Identity Workshop, May 2019
system-level flows that involve identities and other systems Sign-in account recovery, payment, wallet app on smartphone 6 Workflow Protocol flows between connected identities only (external choreography) DID routing (cf. Sam's talk), REST over TCP/IP, SMS & associated data formats/ encryption 5 Transaction How runtime capabilities of an identity are defined and invoked (internal orchestration) Retrieval of attributes including PII, derived PII and their computation, attestations, plug-in capabilities 4 Connection How identities accept connections from other identities and systems Evernym wallet connection with verifier, REST endpoint, DNS janedoe.me 3 Reference How an identity is referenced externally [email protected], did:foo:bar, +1650112332, Evernym connection, QR Code 2 Validation What trust system validates an identity ICANN, Bitcoin, PKI, self-signed certs 1 Storage The de minimis form of an identity that means it exists A blockchain entry, disk connected to a virtual server, a database record on the cloud or a smartphone, a DID record 7-Layer Conceptual Model of Identity* * WIP. Created during two sessions at the MV Internet Identity Workshop, May 2019
system-level flows that involve identities and other systems Sign-in account recovery, payment, wallet app on smartphone 6 Workflow Protocol flows between connected identities only (external choreography) DID routing (cf. Sam's talk), REST over TCP/IP, SMS & associated data formats/ encryption 5 Transaction How runtime capabilities of an identity are defined and invoked (internal orchestration) Retrieval of attributes including PII, derived PII and their computation, attestations, plug-in capabilities 4 Connection How identities accept connections from other identities and systems Evernym wallet connection with verifier, REST endpoint, DNS janedoe.me 3 Reference How an identity is referenced externally [email protected], did:foo:bar, +1650112332, Evernym connection, QR Code 2 Validation What trust system validates an identity ICANN, Bitcoin, PKI, self-signed certs 1 Storage The de minimis form of an identity that means it exists A blockchain entry, disk connected to a virtual server, a database record on the cloud or a smartphone, a DID record 7-Layer Conceptual Model of Identity* * WIP. Created during two sessions at the MV Internet Identity Workshop, May 2019
of not being evil; • They will properly implement controls so that no employees can abuse their power; • They are infallible engineers whose data will never leak; • Not like, say, people who keep passwords in cleartext… • … for over 14 years. * • Then that’s fine, I guess. Pinky-swear privacy involves trust * https://www.businessinsider.com/google-g-suite-passwords-stored-plaintext-2019-5
time zone, • Which IP addresses my connections come from, • That I got served ads that skew towards movies and anime, • That I click on ads about cat food every 3-4 weeks, • That I never click on ads about nearby KFCs. Encryption != Privacy Five data points…
us out of this mess; • People won't leave because of scandals or screw-ups (or they'd have done it already); • People won't switch because your solution is more ethical - we already have those, and people don't use them. If you’re working on identity