[IP] Microsoft calls for online identity overhaul (long)
Begin forwarded message:
From: Ed Gerck <egerck@xxxxxxx>
Date: May 12, 2005 6:16:11 AM EDT
To: dave@xxxxxxxxxx
Cc: Ip ip <ip@xxxxxxxxxxxxxx>
Subject: Re: [IP] Microsoft calls for online identity overhaul (long)
[Dave: comments for IP, if you wish so]
From: "Bennison, Mark M" <mark.m.bennison@xxxxxxxxxx>
Date: May 12, 2005 2:49:28 AM EDT
To: "'dave@xxxxxxxxxx'" <dave@xxxxxxxxxx>
Subject: Microsoft calls for online identity overhaul (long)
"Microsoft calls for online identity overhaul" (http://
www.vnunet.com/ news/1162956)
Tom Sanders at Digital ID World in San Francisco, vnunet.com 11 May
2005
The IT industry needs to adopt an identity meta system to overcome
existing issues with online identities, Kim Cameron, Microsoft's
architect of identity, told delegates at the Digital ID World
conference in San Francisco.
....
(from http://www.identityblog.com/stories/2004/12/09/ thelaws.html)
The Laws of Identity
People who work on or with identity systems need to obey the Laws
of Identity. When we don't, we leave behind us a wake of
reinforcing side-effects that eventually undermine all resulting
technology. The result is similar to what would happen if civil
engineers were to flaunt the law of gravity.
Kim's "Laws of Identity" are quite arbitrary (see my comments below).
Trying to compare them with the law of gravity is marketing, not
science.
These laws are objective because they pre-exist our consciousness
of them.
In science, what is objective does not depend on what each one of us may
understand by consciousness today.
The Laws of Identity, taken together, establish significant
constraints on what a unifying identity system can be.
One needs to be aware of constraints for the particular subset of
reality
where one works. For example, in the context wherein Kim works, can
identity be defined by a natural _and_ a logical connection or just
by a
logical (ie, computable) connection?
The first big breakthrough is to understand that "some set" of
laws exist.
The set does not have to objective, or static. Therefore, to talk about
"some set" is the same as saying "any set" including the empty set --
it is a tautology, it is not informative.
> 1. The Law of Control:
Technical identity systems MUST only reveal information identifying
a user with the user's consent. (Starts here...)
No. This would support spoofing and spam, for example. MUST a user (a
spammer)
who decides to abuse an email identity system be allowed to send emails
without identifying who is sending them?
Look into biology, for another example, to see something that has
been working
for millions of years. This is not how biological systems work. There
is not
a single organism that can hide its identity, there is always either a
passive or an active connection that can be established. The
invisible man
would be blind.
2. The Law of Minimal Disclosure
The solution which discloses the least identifying information is
the most stable, long-term solution. (Starts here...)
No. Look into biology again, for some simple counterexamples.
3. The Law of Fewest Parties
Technical identity systems MUST be designed so the disclosure of
identifying information is limited to parties having a necessary
and justifiable place in a given identity relationship. (Starts
here...)
What is "necessity" and "justifiable"? Neither is an objective
criterium.
Is "necessity" and "justifiable" going to be defined by the vendor?
Or, by the user? Where?
4. The Law of Directed Identity
A universal identity system MUST support both "omnidirectional"
identifiers for use by public entities and "unidirectional"
identifiers for use by private entities, thus facilitating
discovery while preventing unnecessary release of correlation
handles. (Starts here...)
Nonetheless, some systems do exist where all users MUST be 100%
identified.
For example, a public election.
5. The Law of Pluralism:
A universal identity system MUST channel and enable the
interworking of multiple identity technologies run by multiple
identity providers. (Starts here...)
That's why undocumented functions in APIs will, one day, doom those who
create and use them?
6. The Law of Human Integration:
The universal identity system MUST define the human user to be a
component of the distributed system, integrated through
unambiguous human-machine communications mechanisms offering
protection against identity attacks. (Starts here...)
In communications, messages often have meaning and may be linkable to a
particular sender. However, for the technical problem of communication
reliablity, the meaning of messages is not relevant ...nor the identity
of who sent them. These are quite orthogonal issues.
7. The Law of Contexts:
The unifying identity metasystem MUST facilitate negotiation
between a relying party and user of a specific identity -
presenting a harmonious human and technical interface while
permitting the autonomy of identity in different contexts.
This is also called the PKI Dream. Note that the word "relying party"
has legal
as well as technical connotations. In either case, as exemplified in the
X.509/PKIX work, it can be applied well only in a local context --
not in a
global context.
Microsoft's newest plan is to store the identity information in the
user's
computer. While this seems better than storing it in Microsoft's
computer,
all it does is asymmetrically push the liability to the user. It does
not solve the problem of the user, or of the relying parties.
Cheers,
Ed Gerck
-------------------------------------
You are subscribed as roessler@xxxxxxxxxxxxxxxxxx
To manage your subscription, go to
http://v2.listbox.com/member/?listname=ip
Archives at: http://www.interesting-people.org/archives/interesting-people/