On Mon, Dec 16, 2024, 5:26 PM Tom Jones <thomasclinganjo...@gmail.com>
wrote:

> I could have been more clear. If a verifier is asking for information, it
> must include strong human-centric ID of verifier, data retention and
> purpose.  That is not currently possible with the VP. This makes the OID4VP
> an unethical means to request information. See the following:
>

I didn't understand the draft to be limited to OID4VP. Any sort of
presentation would have the same issues.


> https://www.acm.org/code-of-ethics
> Only the minimum amount of personal information necessary should be
> collected in a system. The retention and disposal periods for that
> information should be clearly defined, enforced, and communicated to data
> subjects. Personal information gathered for a specific purpose should not
> be used for other purposes without the person's consent.
>
> Clearly information holders can do what they want with their own data.
>
> Peace ..tom jones
>
>
> On Mon, Dec 16, 2024 at 11:22 AM Pierce Gorman <
> pierce.gor...@numeracle.com> wrote:
>
>> I think I disagree.  I assume an SD-JWT in a VP could be volunteered by a
>> Holder initiating a transaction.  i.e., the relying party Verifier didn’t
>> request the VP.
>>
>>
>>
>> The example I would give is an enterprise making a phone call and using
>> SIP INVITE method Identity header to carry an SD-JWT VP.
>>
>>
>>
>> In the US, the TRACED Act law and several FCC mandates require voice
>> calls in the Public Switched Telephone Network (PSTN) to be authenticated
>> using information contained in a JWT.
>>
>>
>>
>> The basic type of JWT required is defined in RFC 8225 “PASSporT: Personal
>> Assertion Token” and is carried in the SIP INVITE method Identity header.
>>
>>
>>
>> There is also an I-D in the IETF STIR working group which proposes use of
>> an SD-JWT: Verified STI Persona (aka VESPER).
>>
>>
>>
>> I assume the VP could be encoded by value in the SIP Identity JWT or
>> could be passed via a DID document reference (in theory).
>>
>>
>>
>> Pierce
>>
>>
>>
>> CONFIDENTIAL
>>
>> *From:* Tom Jones <thomasclinganjo...@gmail.com>
>> *Sent:* Monday, December 16, 2024 12:50 PM
>> *To:* Watson Ladd <watsonbl...@gmail.com>
>> *Cc:* IETF oauth WG <oauth@ietf.org>
>> *Subject:* [OAUTH-WG] Re: SD-JWT linkability
>>
>>
>>
>> You don't often get email from thomasclinganjo...@gmail.com. Learn why
>> this is important <https://aka.ms/LearnAboutSenderIdentification>
>>
>>
>>
>> *EXTERNAL EMAIL*
>>
>> The entire premise of SD-JWT in a VP transaction is basically fraudulent
>> as there is not sufficient information in the VP to allow the user to make
>> an informed consent decision. It gives the illusion of user control without
>> the ability to deliver on the promise. For this proposal to have any value
>> to the user it must be part of a transaction that tells the user agent
>> (wallet) who is asking for the data and what the purpose of the request is.
>> Absent that, this give the impression of user control of release of data
>> without the fact.
>>
>>
>>
>> BTW - the idea of dealing with the UX of the transaction is admirable,
>> but there are no UX people involved in the discussion.
>>
>>
>>
>> Peace ..tom jones
>>
>>
>>
>>
>>
>> On Wed, Dec 11, 2024 at 5:01 PM Watson Ladd <watsonbl...@gmail.com>
>> wrote:
>>
>> Dear all,
>>
>> I'd like to propose the following edit to resolve the concerns I have
>> around endorsing dangerous applications of SD-JWT:
>>
>> Delete last two lines of
>> https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/451/files
>> in 1338 and 1339
>>
>> Add new paragraph right before the end of the section.
>>
>> "When disclosures include information easily understood to be
>> identifying, users intuitive view of what they are revealing largely
>> matches the underlying technical reality. In cases where the
>> information being disclosed is not identifying, SD-JWT
>> MUST NOT be used as this confusion leads to users making the wrong
>> choices. Applications cannot assume Verifiers behave properly (RFC
>> 3514) and MUST analyze the consequences for such linkage with each
>> credential that could be used."
>>
>> I think this agrees with many of the comments made about my initially
>> stronger edit, while addressing the core danger.
>>
>> Also, it seems this section only really treats issuer/verifier despite
>> promising more. Do we need to rework it?
>>
>> Sincerely,
>> Watson Ladd
>> --
>> Astra mortemque praestare gradatim
>>
>> _______________________________________________
>> OAuth mailing list -- oauth@ietf.org
>> To unsubscribe send an email to oauth-le...@ietf.org
>>
>>
_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org

Reply via email to