Kim Hamilton Duffy: Type present+ to help associate ✪
Kayode Ezike: I have found Jitsi to work well on Mac ✪
ChrisA: For IRC Chris uses "IRC Cloud", there are many other apps or use the web link in the invitation ✪
... Today's focus: Proof of Personhood.
... Turning to a re-introduction. Today's victim is.... <scribe joke>
Topic: Introductions
Udi: Udi Shapiro Weitzmann Institutue currently at W___ Siwtzerland ✪
... was an internet pioneer, for a while did Biology
... now turning to distributed identities
Robert Mitwicki: Introducing himself. Robert, from Poland, representing ___ ✪
... community building self-sovereign identity solution and a new blockchain that seeks to combine identity issues that this W3C working group deals with
Markus Sabadello: Robert from Poland, representing Lab10 collective in Austria ✪
BryanFord: Introduction. professor Comp Sci at EPFL, decentralized and distrib. systems security and privacy focus of many years ✪
... proposed pseudonym parties a while ago.
... working on makeing this vision real
... very interested in democracy, voting, cdeveloping technology to support democracy in secure interaction, and increase the reliability of these technological solutions
... Joined originally due to personal interest. The approaches to identity taken in this group, I feel, will lead to a better world for individuals and their agendas in the real world.
Heather Vescent: ... I have been a privacy/anony for a long time. The right to participate online, vs the vulnerability (wack-a-mole problems) e.g. service can ban then, but they can come back under another name. ✪
Heather Vescent: ... This is a fundamental problem. Read the Sybil attack, paper... (link forthcoming) ✪
Heather Vescent: ... Many solutions have been attempted, multiple ways (e.g. bitcoin/cryptocurrencies, POW (proof of work) tries to solve, but fails.) ✪
Heather Vescent: ... Conclusion of the broad spectrum of the problem ✪
Heather Vescent: ... Solution space: obvious solutions - use real names... (there are up/downsides) ✪
Heather Vescent: ... But you can use other approaches. ✪
Heather Vescent: ... Ppt goes through strengths/weakness for each potential solution ✪
Heather Vescent: ... Real names - already in use for banks, ✪
Heather Vescent: ... Cons, not really secure (and other in the ppt) ✪
Heather Vescent: ... Biometrics: rely on devices, pros: efficient & biometrically secure, & people always have them (good for undocumented people). Used with Aadhar. Big Downsides: worse privacy issues, surveillance, delicious centralized attack surface, to prevent sybil attacks - both false positives & negatives ✪
Heather Vescent: ... Fake biometrics can be created through one hacked scanner... and near impossible to detect. Big cost. ✪
Heather Vescent: ... Graph analysis ... two papers - good to read if you're interested. ✪
Heather Vescent: Promiscuous friending... love that term! ✪
Heather Vescent: ... Independent of physical person attributes. Want it to be a secure token attesting that the holder of the token represents one real person. ✪
Heather Vescent: (Reminds me of what David Birch talks about a lot.) ✪
Heather Vescent: ... There are downsides to this idea: it requires organization in the physical world. It requires people to show up in person to an event. ✪
Heather Vescent: ... IR world, people show up to events, would like to piggyback on this kind of event. ✪
Heather Vescent: ... Q+ (correlation through this token) ✪
Robert Mitwicki: Project which deals with "Real names" https://www.yoti.com/ - they mange to automate it and make it really cheap. ✪
Ted Thibodeau: One token per person means supposed "anonymity" fails, certainly in long term, probably in short term. Think Star Wars --"anonymous" token is held by human who attends both Rebel meeting *and* Imperial Guard meeting? MAJOR problem here. ✪
Mike Lodder: Token is similar to one time use DID ✪
Christopher Allen: Thanks, wanted to share these presentations with the community, because some of us do work in similar space: e.g. Amira. [scribe assist by Heather Vescent] ✪
Ted Thibodeau: The expected normal mode of operation is that each attendee generates a new public/private keypair for each pseudonym party, so pseudonyms are not linkable over time unless and only to the extent the holder wants to link them explicitly. [scribe assist by Bryan Ford] ✪
Heather Vescent: ... Would love to plan/implement ideas at RWOT in Toronto. Maybe we can do some Amira class POP at RWOT, IIW and Lyon. ✪
Heather Vescent: Drabiv/Bogden: graph analysis: do not agree it is cheap. it depends on the network. From my practice/experiments: 200-300 friends, only 5-7 added new fake identities to their friends. So real people on FB from my experience do not add unfamiliar people to their friends. ✪
Heather Vescent: ... Another point: current friending, the edges is not clear. What does it mean to be a friend or connection in Linked In. ✪
Heather Vescent: ... If you know and vouch for this person IRL, and it is not true, you will have a reputation cost. And people will be more strict with creating these edges. ✪
Heather Vescent: Brian Ford: those are good points. Don't discount the possibility of creating an adequate trust network. ✪
Heather Vescent: ... Getting the required security tends to work against the usability. ✪
Heather Vescent: ... Solving the security with usability is hard. ✪
Kim Hamilton Duffy: I think enough people do that other people end up getting pulled in ✪
Heather Vescent: ... You are right that not everyone does promiscuously friend, but many do. There don't need to be that many people who do it. As long as there are a few, a sybil attacker can get a lot of edges that way. ✪
Christopher Allen: I presume these Proofs of Personhood are solely in a context, you'd use a different DID for Empire vs Rebel ✪
Christopher Allen: I suspest that is no "universal" Proof of Personhood ✪
Heather Vescent: Brian Ford: This is a periodic process. Each of the pseudonym tokens has a limited lifetime. Usable for a certain period. ✪
Heather Vescent: ... Doesn't have any information that could tie you to past public keys or instances. ✪
Heather Vescent: ... You might choose to correlate them, but the generation of them, doesn't inherently create linkable information over time. ✪
Bohdan Andriyiv: Small percentage of people (imo <1%) that would friend "promiscuously" especially even in prohibitive environment - will be easylly uncovered/seen ✪
Christopher Allen: Is it unlikely there is a universal proof of personhood [scribe assist by Heather Vescent] ✪
Heather Vescent: Brian Ford: you always want a context. You want the use (of the token) to be in a certain context. ✪
Heather Vescent: ... This is a self sovereignty aspect. ✪