Legal requirements can only be adjudicated by legal means. The common
approach in standards developments should be to enable a legal solution not
to mandate it.

thx ..Tom (mobile)

On Mon, Dec 16, 2024, 11:14 PM Steffen Schwalm <Steffen.Schwalm@msg.group>
wrote:

> In > 80% of use cases the retention period is not defined by law but
> defined by records manager after receiving the information from holder. So
> data retention won`t work. For those thinking about GDPR: Yes possible
> within GDPR too as GDPR does not require definition retention during
> collection of PII. Means only strong human-centric ID of verifier and
> purpose possible
>
>
>
> “Personal information gathered for a specific purpose should not be used
> for other purposes without the person's consent.” à does this mean an
> administration is not allowed to give information about location collected
> for one purpose to the police for another? This would legally not work
>
>
>
> *Von:* Tom Jones <thomasclinganjo...@gmail.com>
> *Gesendet:* Dienstag, 17. Dezember 2024 02:26
> *An:* Pierce Gorman <pierce.gor...@numeracle.com>
> *Cc:* pe...@acm.org; IETF oauth WG <oauth@ietf.org>
> *Betreff:* [OAUTH-WG] Re: SD-JWT linkability
>
>
>
> *Caution:* This email originated from outside of the organization.
> Despite an upstream security check of attachments and links by Microsoft
> Defender for Office, a residual risk always remains. Only open attachments
> and links from known and trusted senders.
>
> I could have been more clear. If a verifier is asking for information, it
> must include strong human-centric ID of verifier, data retention and
> purpose.  That is not currently possible with the VP. This makes the OID4VP
> an unethical means to request information. See the following:
>
>
>
> https://www.acm.org/code-of-ethics
>
> Only the minimum amount of personal information necessary should be
> collected in a system. The retention and disposal periods for that
> information should be clearly defined, enforced, and communicated to data
> subjects. Personal information gathered for a specific purpose should not
> be used for other purposes without the person's consent.
>
>
>
> Clearly information holders can do what they want with their own data.
>
>
>
> Peace ..tom jones
>
>
>
>
>
> On Mon, Dec 16, 2024 at 11:22 AM Pierce Gorman <
> pierce.gor...@numeracle.com> wrote:
>
> I think I disagree.  I assume an SD-JWT in a VP could be volunteered by a
> Holder initiating a transaction.  i.e., the relying party Verifier didn’t
> request the VP.
>
>
>
> The example I would give is an enterprise making a phone call and using
> SIP INVITE method Identity header to carry an SD-JWT VP.
>
>
>
> In the US, the TRACED Act law and several FCC mandates require voice calls
> in the Public Switched Telephone Network (PSTN) to be authenticated using
> information contained in a JWT.
>
>
>
> The basic type of JWT required is defined in RFC 8225 “PASSporT: Personal
> Assertion Token” and is carried in the SIP INVITE method Identity header.
>
>
>
> There is also an I-D in the IETF STIR working group which proposes use of
> an SD-JWT: Verified STI Persona (aka VESPER).
>
>
>
> I assume the VP could be encoded by value in the SIP Identity JWT or could
> be passed via a DID document reference (in theory).
>
>
>
> Pierce
>
>
>
>
>
> CONFIDENTIAL
>
> *From:* Tom Jones <thomasclinganjo...@gmail.com>
> *Sent:* Monday, December 16, 2024 12:50 PM
> *To:* Watson Ladd <watsonbl...@gmail.com>
> *Cc:* IETF oauth WG <oauth@ietf.org>
> *Subject:* [OAUTH-WG] Re: SD-JWT linkability
>
>
>
> You don't often get email from thomasclinganjo...@gmail.com. Learn why
> this is important <https://aka.ms/LearnAboutSenderIdentification>
>
>
>
> *EXTERNAL EMAIL*
>
> The entire premise of SD-JWT in a VP transaction is basically fraudulent
> as there is not sufficient information in the VP to allow the user to make
> an informed consent decision. It gives the illusion of user control without
> the ability to deliver on the promise. For this proposal to have any value
> to the user it must be part of a transaction that tells the user agent
> (wallet) who is asking for the data and what the purpose of the request is.
> Absent that, this give the impression of user control of release of data
> without the fact.
>
>
>
> BTW - the idea of dealing with the UX of the transaction is admirable, but
> there are no UX people involved in the discussion.
>
>
>
> Peace ..tom jones
>
>
>
>
>
> On Wed, Dec 11, 2024 at 5:01 PM Watson Ladd <watsonbl...@gmail.com> wrote:
>
> Dear all,
>
> I'd like to propose the following edit to resolve the concerns I have
> around endorsing dangerous applications of SD-JWT:
>
> Delete last two lines of
> https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/451/files
> in 1338 and 1339
>
> Add new paragraph right before the end of the section.
>
> "When disclosures include information easily understood to be
> identifying, users intuitive view of what they are revealing largely
> matches the underlying technical reality. In cases where the
> information being disclosed is not identifying, SD-JWT
> MUST NOT be used as this confusion leads to users making the wrong
> choices. Applications cannot assume Verifiers behave properly (RFC
> 3514) and MUST analyze the consequences for such linkage with each
> credential that could be used."
>
> I think this agrees with many of the comments made about my initially
> stronger edit, while addressing the core danger.
>
> Also, it seems this section only really treats issuer/verifier despite
> promising more. Do we need to rework it?
>
> Sincerely,
> Watson Ladd
> --
> Astra mortemque praestare gradatim
>
> _______________________________________________
> OAuth mailing list -- oauth@ietf.org
> To unsubscribe send an email to oauth-le...@ietf.org
>
_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org

Reply via email to