That's leaking the existence of PII. That requires permission of the
subject. I think it's way more complicated than you think.

thx ..Tom (mobile)

On Tue, Oct 17, 2023, 6:20 AM Orie Steele <orie@transmute.industries> wrote:

> Hello,
>
> In government documents that feature redaction, it's common for the
> redaction to be given a reason.
>
> For example, in the Mueller report, we can see "Harm to Ongoing Matter",
> "Personal Privacy", "Investigative Technique", as well as "IT" and "HOM".
>
> In SD-JWT we see the following:
>
> Case 1
>
> "_sd": [
>       "IjCRF...znc", // disclosure hash
>       "Qdpt9pL...lhU9UDo" // disclosure hash
> ]
>
> and
>
> Case 2
>
> { "...": "Qdpt9pLE2-MjCr...IzhZlhU9UDo" // disclosure hash  }
>
> After verification and applying disclosures these annotations are no
> longer present.
>
> I wonder if it would be worth allowing a reason for why a holder might
> have retained a redaction (or chose not to disclose for a reason).
>
> Since the payload is committed to by the issuer, this information would
> have to be present in the disclosures collection for the SD-JWT.
>
> Here is an example disclosure:
>
> [
>   "8UbQ9NZ6xseoDqMW_Bd50A", // salt
>   "type", // json object key (always a string)
>   [ // json object value
>     "VerifiableCredential",
>     "ExampleAlumniCredential"
>   ]
> ]
>
> Consider the following strawman syntax for disclosing a redaction reason:
>
> {
>   "disclosure hash" : "Personal Privacy" || "Harm to Ongoing Matter"
> }
>
> This allows a UI to map the redaction reason into a presentation (ui)
> layer for the issuer secured payload.
>
> Since it's an unsecured object, it can be extended with other fields at
> the discretion of the holder or issuer.
>
> However it might be secured by nesting it inside another JWT or SD-JWT.
>
> It would only slightly complicate the verification logic, you would need
> to filter any encoded disclosures by the `ey` prefix, since they will never
> be found in the payload, as we know they will hash differently than array
> encoded disclosures, which will be found in the payload.
>
> I'll be giving a presentation on this topic to the W3C Credentials
> community group later today, happy to shuttle their reactions back to this
> list.
>
> Apologies if this has been discussed previously.
>
> Regards,
>
> OS
>
>
> --
>
>
> ORIE STEELE
> Chief Technology Officer
> www.transmute.industries
>
> <https://transmute.industries>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to