No, I don’t mean an ID number. More so attributes of an entity attested by
a non-governmental entity, and it could use privacy enhancing cryptography
in this steelman.

Best,
Wayne Chang
Founder & CEO | SpruceID <https://spruceid.com/> | LinkedIn
<https://www.linkedin.com/in/waynebuilds/>


On Wed, Dec 25, 2024 at 02:17 Tom Jones <thomasclinganjo...@gmail.com>
wrote:

> if by ID you mean ID number - then it is a tracking number.
> Isn't it super obvious - why are we pretending to be privacy enabling?
>
> Peace ..tom jones
>
>
> On Tue, Dec 24, 2024 at 10:15 AM Wayne Chang <wa...@spruceid.com> wrote:
>
>> Tom, how do you feel about private sector issued ID?
>>
>> Best,
>> Wayne Chang
>> Founder & CEO | SpruceID <https://spruceid.com/> | LinkedIn
>> <https://www.linkedin.com/in/waynebuilds/>
>>
>>
>> On Wed, Dec 25, 2024 at 02:04 Tom Jones <thomasclinganjo...@gmail.com>
>> wrote:
>>
>>> While Waton's statement is correct - it does not address the core
>>> problem with any credential that comes with an ID.
>>>
>>> All reusable IDs enable tracking.  Full Stop.
>>> All government issued ID enable tracking. Just like social insurance
>>> number or any other cred.
>>> So - if you want privacy - don't release the ID number.
>>>
>>> Peace ..tom jones
>>>
>>>
>>> On Tue, Dec 24, 2024 at 6:34 AM Watson Ladd <watsonbl...@gmail.com>
>>> wrote:
>>>
>>>> I see that people are uncomfortable with making any mandates, and so
>>>> I've tried to be purely descriptive in this proposal. I leave it to the WG
>>>> to decide where to put it, but I see it as a wholesale replacement for some
>>>> sections to emphasize clarity.
>>>>
>>>>  "SD-JWT conceals only the values that aren't revealed. It does not
>>>> meet standard security notations for anonymous credentials. In particular
>>>> Verifiers and Issuers can know when they have seen the same credential no
>>>> matter what fields have been opened, even none of them. This behavior may
>>>> not accord with what users naively expect or are lead to expect from UX
>>>> interactions and lead to them make choices they would not otherwise make.
>>>> Workarounds such as issuing multiple credentials at once and using them
>>>> only one time can help for keeping Verifiers from linking different
>>>> showing, but cannot work for Issuers. This issue applies to all selective
>>>> disclosure based approaches, including mdoc. "
>>>>
>>>> Sincerely,
>>>> Watson
>>>> _______________________________________________
>>>> OAuth mailing list -- oauth@ietf.org
>>>> To unsubscribe send an email to oauth-le...@ietf.org
>>>>
>>> _______________________________________________
>>> OAuth mailing list -- oauth@ietf.org
>>> To unsubscribe send an email to oauth-le...@ietf.org
>>>
>> _______________________________________________
>> OAuth mailing list -- oauth@ietf.org
>> To unsubscribe send an email to oauth-le...@ietf.org
>>
>
_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org

Reply via email to