• Skip to primary navigation
  • Skip to main content

Identity Woman

Independent Advocate for the Rights and Dignity of our Digital Selves

  • About
  • Services
  • Media Coverage
  • Podcast
  • Blog
  • Contact
  • Show Search
Hide Search

Blog

Industry orgs “warn” states against BIPA style laws. Why not have a dialogue at Thoughtful Biometrics Workshop – March 16th

Kaliya Young · March 10, 2023 ·

People and their representatives are rightly concerned about how biometric systems are used. This week while reading all the industry news I came across this article – CCIA Testifies On Maryland Biometric Privacy Proposal, Submits Written Comments On Biometric, Childrens, And Health Privacy Bills.

So what is BIPA? It is the Biometric Information Privacy Act that Illinois passed several years ago requiring any capturing of a biometric information in a template and in samples must get the subjects explicit consent. If companies don’t they face really large fines. White Castle just might have a $17billion dollar fine for violations over 10 years.

Industry associations like the Computer & Communications Industry Association are pushing back against these measures. This is their job to lobby on behalf of their members. Here is what they said.

The following can be attributed to CCIA State Policy Director Khara Boender:

“We share Maryland legislators’ concern about protecting biometric privacy and request that measures to address this important issue provide enough lead time for responsible sites to comply. We also recommend directing protections toward high-risk practices and aligning key definitions with privacy standards to encourage harmonization across state laws and aid compliance.”

“Privacy is particularly important for health data and for children online. While CCIA supports privacy measures tailored to specific age groups and the handling of more sensitive health data, the bills legislators are considering should prioritize ways to enable responsible companies to provide effective protections  rather than introducing punitive models with private rights of action that, in other states, have opened the floodgates to costly lawsuits.”

– CCIA Blog

I am hoping that organizations like CCIA can actually come to the Thoughtful Biometrics Workshop on March 16th and talk together with folks who are concerned about biometrics usage by the private sector and by government.

Biometrics =/= Digital ID

Kaliya Young · March 10, 2023 ·

I have been engaging with folks who work developing biometric systems and folks who are concerned about biometric systems for in preparation for the Thoughtful Biometrics Workshop coming up March 16th.

Two weeks ago I attended Biometrics Regulation: Global State-of-Play Symposium (one to many talking on zoom with no chat function) put on by the Berkeley Center for Longterm Cybersecurity.

The aim of the virtual symposium is to discuss the global state-of-play for biometric data protection. We want to think more critically about biometric technologies as well as biometric regulation. As a result, we want to merge conversations on data protection compliance with broader technological, social and policy issues in different biometric technologies.

– Workshop Description Biometrics Regulation: Global State of Play Symposium

The presentations were interesting and it was great to have folks from all around the world present. India’s Aadhaar system was discussed and a newer system that has similar qualities was just rolled out in Brazil.

However something very concerning – throughout the discussion there was repeated conflation of biometrics with digital ID. This conflation is a problem to have the type of real discussion we need to have about both but to not conflate them.

I think the conflation comes from the builders of certain systems like Aadhaar and MOSIP along with those promoting these systems like the World Bank and Omidyar.

I’ve been working on “Digital Identity” since 2002-3 and the folks that inspired me to look at this issue were really considering how independent people expressed themselves in the digital world with their handles or avatars. This really began with the general public with the first internet services in the west like AOL, Compuserve and Prodigy. When you signed up to these services you picked a handle/user-name or maybe a few and that likely connected to an e-mail account. This user-name and the email associated with it are “digital identities”. Your twitter handle is a digital identity. Your Gmail account or Yahoo account is a digital identity.

In the last 10 years you have these large scale national ID (Aadhaar) systems being developed (MOSIP) and pushed out to whole populations that in order to get a “record in the digital database” as a citizen you have to go through an erollment and registration system that requires you to share your biometrics – often a photo, iris scans of your two eyes and capturing of all 10 finger prints. Then this national system deduplicates you – makes sure you didn’t already enroll and then issues you a ID number that is in the digital database of the nation state.

– How Aadhaar is Giving an Identity to 1.3 Billion Citizens?

Then these national ID systems then create ways to “authenticate” against the database – prove that the person is represented by a given number/record in a database.

– How Aadhaar is Giving an Identity to 1.3 Billion Citizens?

This is a very different architecture/design of digital identity than people have accounts in digital services. These two very different paradigms of what “digital identity” is – is part of the massive confusion around the language we are using.

There is a new paradigms around digital identity that involve collecting and sharing attributes from authoritative sources in the form of Verifiable Credentials is yet another type of decentralized digital identity that I spend a lot of time these days working on and convening people working on it at the Internet Identity Workshop.

Several years ago I co-wrote a paper about how biometrics could play nice with this new decentralized digital identity called Six Principles for Self-Sovereign Biometrics. If you look at what US Citizenship and Immigration is doing with their roll out of digital green cards using the verifiable credential technology on the digital green card holder’s wallet will have a photo encoded that when presented can be checked against the presenter’s face in real life. This aligns with what we outline. There is no “phone home” to the USCIS database to pull the photo and then compare – the needed biometric a photo is digitally signed and in a credential that can be compared with the presenter.

Federal Agencies using Facial Recognition Technology: GAO report from 2021

Kaliya Young · March 10, 2023 ·

I just learned about a 2021 GAO report. It says that This means it is likely that more agencies are using FRT for more reasons. This report seems relevant because for the third time legislation is being put forward to do a Federal Facial Recognition Ban just this week.

The diagrams within the report do a good job of articulating clearly and simply different use-cases and how the systems work. I think they are great points of reference for us to use next week at the Thoughtful Biometrics Workshop on March 16th.

This set of diagrams articulates a whole range of uses by federal agencies.

– GAO report: Facial Recognition Technology: Current and Planned Uses by Federal Agencies

This diagram really stood out for me because they are clear that there is a difference between Matching or what they call Verification or Identification. This different is really key and today there are proposals coming out from congress about banning FRT broadly.

– GAO report: Facial Recognition Technology: Current and Planned Uses by Federal Agencies

This type of broad ban would limit the ability of agencies to use computer vision to match people to their documents – a technology that is widely used at boarder crossing in the US now and TSA has begun experimenting with at check points.

It would also limit the use of Biometrics as part of Biometric Exit I wrote about last week that compares passengers boarding flights leaving the US complied with access to galleries of photos of passengers drawn from DHS records (from entrance photos, document photos and passport records).

The GAO report includes a table breaking down the number of facial recognition systems owned by each agency:

  • Commerce Department: one system, used for physical security.
  • Defense Department: seven systems, used for physical security, domestic law enforcement, national security and defense, and other purposes.
  • Energy Department: one system, used for physical security.
  • Health and Human Services Department: three systems, used for physical security, domestic law enforcement and digital access/cybersecurity.
  • Homeland Security Department: four systems, used for domestic law enforcement, border and transportation security, and national security and defense.
  • Justice Department: seven systems, used for physical security, domestic law enforcement, national security and defense, and other purposes.
  • State Department: one system, used for border and transportation security, and national security and defense.
  • General Services Administration: one system, used for digital access/cybersecurity.
  • NASA: one system, used for “other” purposes, including employee identification if they forgot their badges.

I recommend scanning through the report to see the range of use-cases. I think it can be useful in having a nuanced conversation about use-cases/applications that make sense and ones that could be harmful and really impact civil liberties.

Biometric Exit – its creepy.

Kaliya Young · February 27, 2023 ·

I work on digital identity and this described below experience really highlighted the problem with much of the Biometrics industry and governments who use the technology – no explanation of what is actually happening or how a system got the template of my face. It re-affirmed for me the need for the Thoughtful Biometrics Workshop coming up March 16th.

I left SFO on Saturday at midnight on an EVA flight to Taipei. 

Biometric Exit combined with boarding that involved no presentment of a ticket or passport really caught me off guard. It was quite frankly creepy. 

I never agreed to share my photo with the airline – or to be part of a gallery (The group of photos of all people who would be getting on a plane). I just thought I was going through normal boarding where I would share my ticket and passport as part of getting on the plane. 

Instead I was asked to stand in front of a camera/screen that took my photo and then beeped/flashed green to say it was ok for me to get on the plane. 

When I said to the woman who was at the gate – what was going on that I hadn’t consented to this and where did they get the template to do this.  She was a bit surprised by my question and  shrugged and said she thought they got it off the chip on my passport.  Except I know this didn’t happen.  When I checked my bag in they only did that machine readability off the visual MRTD part of my passport – by swiping it through the reader on their keyboard.  

So I’m putting things together about what I think happened. 

CBP is doing Biometric Exit in collaboration with the airline.  (article confirming this)

The PNR – passenger name record is shared ahead of time with CBP – they put together a gallery (templates/photos of all the people who’s names appear as being on the flight) and then they use this gallery when folks pass through the live scanner.  This is me putting things together based on some of what I know and what I think is going on. 

The fact that there was no signage to explain to folks what is happening or how is really scary to me. This type of thing – where all of a sudden a thing is scanning your face and giving you a go/no-go to get on a plane is why people mis-trust facial recognition systems and technology.  I checked San Francisco has a ban on facial recognition technology – but only for local government agencies. 

I hope we can talk about this experience and others at the Thoughtful Biometrics Workshop coming up March 16th.  Please join us. 

Digital ID architectures matter. So does the way we talk about them.

Kaliya Young · February 26, 2023 ·

I am reading a new article out asking if 2023 is the year of Digital ID.

It might be – lots of good developments are happening.

AND we also have a disaster of communication about how some systems work.

The article is referencing the way that TSA works where the employee puts the ID into a card reader which verifies the ID and then looks at the picture of the person presenting it to see if it matches. Then goes on to talk about how the digital version would work.

A digital ID would work the same way. The person would present a phone, which would have a barcode or QR code, which can be scanned, and links to a government record. “Essentially, your phone becomes a token which refers to a government authorized database,” said Miller.

– Is 2023 the Year of the Digital ID?

If that is how it is going to work – where I am presenting tokens that “refer to a government authorized database” then count me out. It sounds like to the non-sophsticated reader it pings the database and pulls down a photo of the person sharing the token. It might work this way – if people think reading it it does work this way – we can’t get adoption in the US. The ACLU has a whole report out about the worrisome phone home architecture that is optional with the mDL standard.

I did a search for mDL and TSA and this PDF showed up.

Look there is a direct link between the issuing authority and the TSA in the Relying party role – the little arrow says Key/Cert Exchange but is the public going to read that? Or are they going to think there is a connection to the database.

Another problem with the report and the way they talk about the solutions is that there are only phone hardware and software manufactures that are listed as the rightful arbiter of this system of IDs. What about other wallet manufactures.

Biometrics in Airports? Senators call for a ban. The IBIA & SIA respond. Lets discuss at Thoughtful Biometrics Workshop March 16th.

Kaliya Young · February 24, 2023 ·

One of the big developments related to biometrics in the United States in the last month is a call by senators “calling on TSA to immediately halt its deployment of facial recognition technology.”

My understanding of what is going on is facial matching between a presented document with a photo on it (passport or drivers license/stateID) and the person present. This is a similar kind of matching that happens when I cross the US boarder with my green card – they have my green card picture on file and then they point a camera at me and see if I match the picture on my card. 1:1 matching.

There are a lot of questions the Senators ask you can see the full letter here.

1. Please provide data on the accuracy and volume of TSA’s facial recognition technology program from 2020 to 2022 broken down by race, ethnicity, and gender that includes:

  1. the rate of false positives and negatives produced;
  2. the total number of travelers who had their face scanned by TSA;  
  3. the total number of travelers who opted out;
  4. the total number of cases where TSA stored its facial scans, instead of immediately deleting.

2. How are travelers notified of their right to opt-out of facial recognition? What are the effects on a traveler who chooses to opt-out of facial recognition?

3. Under TSA’s current system, do travelers who choose to opt-out face any additional consequences or additional screenings, pat-downs, interrogations, or even detention, beyond what they would have encountered at a non-facial recognition airport?

4. What training measures does TSA currently mandate for staff to regarding travelers who choose to opt-out of facial recognition technology?

5. Has TSA ever shared biometric data with other government agencies? If so, which agencies and for what purposes?

6. What measures is TSA taking to protect biometric data from cyberattacks or any other form of unauthorized distribution or release? How does TSA ensure the security of Americans’ data that third-parties have access to? Is TSA aware of any breaches of travelers’ biometric data collected at US airports? If so, please detail all such breaches.

This has prompted some responses from the biometrics industry with a post by the International Biometrics and Identity Association (IBIA) and the Security Industry Alliance (SIA). Both push saying that there are significant mis-understandings about the technology and how it works.

There is also video interview with Robert Tappan the Executive Director of IBIA on the Identity Week site. The interview is about 10 min and covers these topics:

  1. Why do you think the terms “surveillance” and “identity verification” have been conflated? What are the perceptions of facial biometrics? True or not?
  2. Is there evidence at all to suggest face verification technology is being used in the wrong way to invade privacy?
  3. Talking to some vendors, some say there are some inherent biases in the level of technology that are being mitigated. Do you disagree that bias in biometrics now exists?
  4. What are the differences between surveillance and verification that you suggested in your comments?
  5. How do these claims/ beliefs affect trust?
  6. Describe the level of progress in America with biometric deployments and are some unfounded beliefs that biometrics are ‘threatening our democracy’ derailing progress?

It is these deep disconnect between how the technology works in the real world, what it does and the public and legislator’s concern about it that the Thoughtful Biometrics Workshop was created for. My hope is we can dig and explore the nuances. I hope you will join us on March 16th.

Who is invited to the Thoughtful Biometrics Workshop?

Kaliya Young · February 16, 2023 ·

The workshop is coming up March 16th virtually. If what I write below resonates with you please consider joining us

I thought long and hard about key constituencies to invite to the Thoughtful Biometrics Workshop and why. I collaborated with Kyra Auerbach to create this image that captures it.

Constituencies for the Thoughtful Biometrics Workshop

There are many biometrics, ways to capture and measure them, and places in a techno-social system they can be implemented.

The technology landscape is wide and the policy and issue landscape they present is also vast.

This is what we explore at the Thoughtful Biometrics Workshop. 

Biometrics as a technology are not entirely “new” – for example, photos have been a part of government-issued identity documents for almost 100 years as 1:1 matching between a human and an identity document. As technologies have progressed (computer vision, AI, ML), new biometric technologies have emerged, enabling products with various use-cases and applications.

There is much to consider regarding thoughtful use. This is one reason we don’t pre-set an agenda, but instead invite key stakeholder communities with different knowledge bases and perspectives to engage in mutual learning and dialogue. 

Our hope is to gather humans who care about, are interested in, and are concerned about technology, in order for new perspectives and opportunities to shape future policy to emerge. These are the stakeholder groups invited to the Thoughtful Biometrics Workshop and why:

Civil Society Advocates and the Interested Public

New technologies have many implications. The public is naturally concerned about Biometric Technologies, while Civil Society Advocacy organizations are tracking the development of these technologies and raising concerns about their usage in various contexts. 

TBW provides an opportunity to share concerns and ask deep questions of the people who make and implement the technologies, to understand more about how they work in practice. There is also opportunity to share research and studies that have been done highlighting the flaws and misuses of biometric technology with creators, implementers and policy makers. 

Biometric Research Scientists & Companies that make Biometrics Products

Companies use the work of biometric scientists to make products. Many technologies are combined to make products that apply to different use-cases.  TBW provides an opportunity to share details of how various biometric modalities work (capture and comparison mechanisms) in practice, and to dispel misconceptions. There is also opportunity to share how technologies are combined to make products and how these work with other systems. 

Policy Makers and Regulators

Biometrics are diffusing and being adopted in a variety of settings across many domains: employment, government, commercial and civil society.  Some of these uses are aligned with existing policy requirements, some are novel uses that are not yet regulated at all. 

TBW provides an opportunity to understand the concerns that civil society advocates and the public have about existing and future uses that require reasonable regulation. The event is also an opportunity to learn in more detail from experts in biometrics and understand how the technology works in practice. 

Biometrics Implementers in the Private Sector, Government, Civil Society

These are organizations who buy biometrics technology solutions from companies to use in their day-to-day operations. They apply the technology either for authentication (checking someone matches an enrolled identity) or for identification. TBW provides an opportunity to share how and why they use biometric products to solve operational needs and explain more about their reasoning. 
​The event is also an opportunity to learn more details of how the technology works from the researchers, and to hear more about concerns regarding misuse and overuse. 

Technologists Working in Related Areas

There are a range of neighboring technologies and systems often used in conjunction with Biometrics, including identity and access management. TBW provides an opportunity to learn from a  range of stakeholders involved in biometrics technology, and to share perspectives about how neighboring technologies interact with biometrics.  

Speaking at the 2023 Conference of the Plurality Research Network

Ali · February 16, 2023 ·

At the Plurality Research Network Conference 2023, which commenced on January 13, 2022, and continued through January 15, 2023, I delivered a lighting talk the first day.

A Little Introduction to the Conference

Researchers and practitioners from various domains, such as computer science, sociology, political ethics, and government, who are exploring plural technologies are brought together at the Plurality Institute.

Plural technologies are reusable computing platforms that promote collaboration and development across various social communities.

A Brief Overview of My Talk at the Conference

Plurality Research Network Live Conference

During my presentation at the conference, I discussed the issues and difficulties that are associated with digital identifier systems, including the following examples:

  • There is no way for us to influence the assignment of digital Identifiers (private namespaces and globally managed registries).
  • Architectures for phone home or surveillance systems (the OpenID authentication process).
  • There is no standard method for sharing attributes.

I also discussed how different groups, organizations, and political systems handled the management of their own boundaries historically using paper.

After that, dove into Decentralized Identity. I went through the identifiers that don’t fall under the category of private namespaces or global registries. In essence, the protocols of DID (decentralized identifier), together with the standard components of the DID document, as well as Verifiable Credentials. You can se my talk here.

I really enjoyed the other talks given that first day. You can see them all here – if you click on “show more” in the comment each different speaker has their own links.

What are biometrics?

Kaliya Young · February 9, 2023 ·

I first was exposed to biometrics at scale when I was working within the National Strategy for Trusted Identities in Cyberspace – Identity Ecosystem Steering Group that would host meetings “next to” biometric industry conferences. They were really kinda freaky for the technology presented and how I imagined it all being used.

I still have a very cautionary attitude towards biometrics technology however I am not scared of them in part because I have met folks who work more closely with and deepened my understanding.

In the fall of 2020 I proposed to Jack Callahan. We put on the first Thoughtful Biometrics workshop in March 2021. Now we are organizing the 2nd one coming up March 16, 2023. It is virtual and online. Learn more here and Register!

This is explanation of Biometrics I wrote for the workshop.

The term “biometrics” comes from two roots:  

bio meaning biological life + metrics meaning measurement

Therefore, it is defined as the measurement of biological characteristics. Every person has unique bodily or physical (biological) characteristics, and these can be measured, described and recorded or documented in various ways. Once documented they can be compared for identification or authentication purposes. 

Biometrics existed well before the creation of digital computers. For example, fingerprints have been collected and compared to establish identity since the mid-1800’s, and photographs used on documents such as passports starting about 100 years ago. 

Digital technology and other key innovations over the last 40 years, including advances in computer vision, algorithmic processes, and matching algorithms have expanded biometrics deeply into our digital world. 

Types of biometrics

All biometric modalities are basically two types; physiological and behavioral.

Examples of physiological biometrics include fingerprint, iris, retina, face, palm, and vein recognition. Examples of behavioral biometrics include signature and voice recognition.

APPLICATIONS OF BIOMETRICS:

1:1 matching for authentication:

Looking at a biometric associated with a particular person or record and seeing if the person presenting a sample of their biometric matches the biometric template that was previously enrolled. For example, 1:1 Matching on devices such as unlocking a phone using a fingerprint or faceprint.

Human 1:1 Matching against a document such as a passport, drivers license or other document. This can be done by a human looking at the picture and comparing, such as when you buy an age-restricted product. The clerk does a match between the document and a face along with checking the age of the person presenting the document. 

Computer 1:1 Matching against a document such as a passport, drivers license or other document. Computer vision is used to look at the person standing in front of a camera and compare them to a photo encoded on a document.

1:1 Matching against a sample enrolled in a system. An employer might have a biometric enrolled and on file to be compared to 1:1 when the employee presents themselves.

1:small n matching for authentication

This type of biometric usage involves the enrollment of a small group of people into a system. One use-case is all the people boarding a particular plane. The individuals traveling can share their photo and travel documents with the airline in the check in process. The photos are now in a gallery of a few hundred. When going to board the plane individuals can present themselves and be allowed to board after they match one of the faces in the gallery of photos of people who are passengers on the plane.

1:large n matching and identification

An important question for this mode is: does it happen in real time, or later in a forensic context?

In real time a video can capture snapshots of faces and then run the faces against a large n of potentially millions of people. If implemented on a camera on a public street, this would output a list of all the people who walked past. 

Forensic use of biometrics really began over a century ago with fingerprint matching. Fingerprints lifted from crime scenes were compared with fingerprint records of people. This is still done today but with electronic systems doing the matching. For forensic facial recognition, images of people are captured in retrospect from video or still photographs from a crime scene. These are compared with large data sets of images of people along with their names. 

EXAMPLES OF OTHER PLACES WE USE BIOMETRICS

Smart Speakers

Voice recognition goes beyond understanding speech; some devices are able to distinguish between people based on a pre-enrolled voice print. We could also see databases of voice prints created to compare samples against, much like we have photos of people being compared using facial recognition algorithms.

Wearable Sensors for Health tracking

There are more and more devices that use sensors to track things like heart rate, temperature, or oxygen levels. These devices in the form of rings, watches, bracelets, etc. record and share this information.

Augmented Reality (AR) and Virtual Reality (VR) Devices

AR and VR work with sensors that track head location and movements, eye movement and focus, facial expressions, hand movements, heart rate and even perspiration.  

We may have missed some biometrics use-cases –  feel free to reach out and share more! 

IAPP Event: An Intro for Data Privacy Pros to Self-Sovereign Identity

Ali · January 12, 2023 ·

An event hosted by the International Association of Privacy Professionals (IAPP) asked me to give a talk on the subject of self-sovereign identity and provide a foundational overview for privacy professionals.

The following are some of the primary issues discussed throughout the event:

  • Exactly what it means to have a self-sovereign identity.
  • The direction in which the space is moving.
  • What privacy professionals need to know.

The Panel was put together by Katharina Koerner, the Principal Technology Researcher at IAPP. Myself, Dominique Beron CEO of walt.id and Kristina Yashuda, who does Identity Standards at MSFT.

Kailya, Kristina, Dominique, Katharine

Self-sovereign identity (SSI) is essentially a fresh take on digital identity solutions. Its goal is to empower users with additional options in managing their online identities and in deciding how much of their private data to make public.

In this manner, the self-sovereign identity technology provides assistance for the data reduction and purpose restriction tenets of privacy.

Simply click this link to see the whole video.

DWeb 2022 Talk: Decentralized Identity Open Standards

Ali · January 10, 2023 ·

At the invitation of the organizers of DWeb Camp 2022, I delivered a session on the subject of three open standards for decentralized identities.

Kaliya talking at DWebCamp – clicking on photo goes to the video.

Decentralized identifiers, verifiable credentials, and decentralized identifier communication were discussed throughout this session as three of the most important developing standards for decentralized identity.

Decentralized Identifiers: I went through a variety of issues in this standard, including how a decentralized identifier (DID) differs from private name spaces and globally controlled registries, what it looks like, the standard components of a DID document, DID specifications, and more.

Verifiable Credentials: In this section, I discussed what verifiable credentials are, how they function, as well as characteristics and benefits such as extensive expressive capacity and a vast array of potential applications.

Decentralized Identifier Communication: It is also known as DIDComm Messaging, and inside it, we are able to have peer-to-peer ownership of the social graph commons. During our presentation on this protocol for decentralized identification, I went through its viability and several uses, in addition to the mechanism behind it.

To that aim, I also discussed ways in which we might integrate many of the aforementioned open standards. In addition, two more standard ideas, the “personal data store” and “object capabilities,” have been offered in the conclusion.

Here is the link to the complete video:

https://archive.org/details/25-15-45_-_decentralized_identity_open_standards.qt

Forbes Quotes me on Social Media’s Future considering Safety & Identity

Ali · January 7, 2023 ·

I was cited in an article that was published in Forbes. The article was part of a series that was assessing the activities of 2022 on Twitter, the crazy policies of a new CEO, and the ramifications on the future of social media.

The article’s central emphasis was on the question of whether or not, in the near future of social media, users can feel secure while maintaining their individual identities.

I was quoted in the following lines as part of a discussion on the pros and cons of maintaining anonymity and pseudonymity online:

“Kaliya Young, Identity Woman, recalls an incident with Kathy Sierra, a female blogger and game developer, who in 2007, experienced death threats online and finally gave up her tech career, withdrew from the blogosphere and from online life. Following that incident there were calls to create blogger codes of conduct to stop this online violence against women.”

“’Look, if the first bad instances of online violence against women were treated seriously and the perpetrators that were not known were held to account then we would be in a different place [today]. They were not.’ Weeve, the pseudonym, of the hacker and self-described neo-Nazi and white supremacist responsible for posting false information about Sierra, had gone unpunished. As per Young, ‘He should have gone to prison for that. I was at the conference when they got up and said Kathy isn’t here because of death threats! It affected my life as a woman working in technology. Instead, he was left alone and went on to commit more acts of terrorism.’”

About the other side, you may find me in the following lines, where I’m contributing to a discussion regarding the importance of transparency and verification:

“Young stresses that it will take ‘time, rigour, investment and a proportionate approach’ to see the payoff. She points out that there is also a middle ground and it’s possible to implement speed bumps to make it less appealing for bad actors to exploit a poorly designed platform. ‘Designing a social media platform with possible consequences including, but not limited to privacy and security risks in mind (like One Dot Everyone, a consequence scanning tool), can improve the design while exploring alternatives to identity verification. Privacy Impact Assessments and Human Rights Impact Assessments will also go a long way to mitigate risks.’”

“Young questions the process for verification. Who will decide a person is who they say they are? Given her work in the Identity space, development of a trust framework should be leveraged to deal with the complexities of identity verification. But it continues to call into question what individuals or groups are responsible for defining the rules for verification?”

“Young professes that Identity has its place online but argues that the systems including the governance layers need to be in sync. ‘So men like Galloway and Haidt can go on about this ‘real name’ stuff all they want. Until the systems they built actually work as claimed and that men who use their real names and are known will be held to account, then what business do they have suggesting that?’”

Now, the purpose of this section is to provide a response to the following question: will technology save us? In the passage that follows, I am referenced as follows:

“Social media accounts have been around for a long time and Young makes clear they are, for the most part, run and managed by real people, attached to other real identities online that have more credibility: I think that analog is the new digital – meaning people will seek out and connect and value time with each other in person.”

Lastly, I am cited in the following lines on the remark that identity verification on social networks does not compute or make sense:

“As per Young, identity needs careful and thoughtful consideration:

There is a difference between the platform knowing who someone is and the whole world knowing the same. Who is enforcing what type of ID? Like Doctor, Young signals the marginalized, and those who have been suffering the abuse on the platform for over a decade. The rules for verification need to incorporate the varying definitions of identity that include cultural, general and local perspectives.”

You can read the full article here: https://www.forbes.com/sites/hessiejones/2023/01/04/will-the-future-of-social-media-mean-the-coexistence-of-safety-and-identity/?sh=5851ac587fba

Quoted in IEEE article about Worldcoin and their shift to Digital ID.

Ali · January 5, 2023 ·

I was asked to offer my perspective on the risks associated with the biometric data of Worldcoin, which was included in an article Spectrum IEEE published.

A crypto currency, Worldcoin, aspires to become the most globally and uniformly distributed cryptocurrency ever by allocating the same modest number of coins to every individual on Planet. The business has spent the last year creating a system that allows other parties to utilize its vast registration of “unique humans” for various identity-focused applications.

However, Worldcoin’s biometrics-focused approach is being greeted with widespread concerns regarding privacy, security, and transparency.

Here is the section of the article where I was mentioned about the possible risks posed by Worldcoin’s biometric data.

“It’s also questionable how useful the concept of ‘unique humanness’ really is outside of niche cryptocentric applications, says Kaliya Young, an identity researcher and activist. Identity plays a broader role in everyday life, she says: ‘I care what your university degrees are, where you were born, how much money you make, all sorts of attributes that PoP doesn’t solve for.'”

Another one:

“Worldcoin’s biggest challenge may not be the functionality of its technology but questions of trust. The central goal of blockchains is to avoid relying on centralized authorities, but by using complex, custom hardware to recruit users, the company is setting itself up as a powerful arbiter of digital identity. ‘Worldcoin posits that everyone in the world should have their eyeball scanned by them and they should be the decider of who’s a unique human,” says Young. ‘Please explain to me how that’s not ultracentralized.‘”

You may read the complete article by clicking on the following link: https://spectrum.ieee.org/worldcoin

Save the Date: APAC Digital Identity unConference, March 1-3, 2023

Kaliya Young · December 7, 2022 ·

We are really thrilled to announce the first APAC Digital Identity unConference March 1-3, Bangkok, Thailand. Registration is now LIVE!

Fostering Innovation and collaboration between emerging digital identity companies across the APAC region. 

Welcome reception in the evening of Wednesday March 1

March 2-3 full conference days. 

The event is inspired by the Internet Identity Workshop and will use the same Open Space format where the agenda is co-created the morning of the event by all the participants. 

The two facilitators and producers of IIW, Kaliya Young, Identity Woman and Heidi Nobantu Saul are collaborating with a local partner Newlogic to host and produce the event. 

The conference venue is  True Digital Park, our venue partner, which is 24 min from the airport and has numerous hotels nearby.

We are working on a website and registration will open soon.  So stay tuned we will announce it on all the channels we have. 
There are sponsorship opportunities similar to IIW that cover conference costs, help keep ticket prices lower than usual and support the community. Please reach out to Heidi at heidi@heidinobantu.com  if you are interested in learning more about sponsorship opportunities.

Identosphere

Kaliya Young · November 15, 2022 ·

Infominer and I have been publishing the weekly Identosphere Newsletter and Summary of all that is happening Self-Sovereign and Decentralized Identity.

These are ways you can contribute a one time end of the year contribution:

Prices

Or subscribe with a contribution every month this button will take you to a page where you can pick a monthly contribution amount.

this QR code goes to the Paypal Donation page

You can also choose to pay monthly via Patreon.

Or you can reach out to Kaliya and ask for an invoice kaliya@identitywoman.net

Thoughtful Biometrics Workshop

Kaliya Young · November 3, 2022 ·

It is happening again. February 13-17th. March 16th Registration is open.

Two things happened today that solidified the decision to move forward with the event.

  1. I had a great conversation with a government of Canada official who started his career as an officer at a boarder crossing and is currently inside the government on modernization on boarder crossing system and process. We are sending him a formal invite tomorrow.
  2. My friend Pet Kaminski shared the event with his newsletter/mailing list community Collective Sense Commons and framed the event and my work very well.

This is a bit of a sneak peek, because registration isn’t open yet – although there is an RSVP form to save your place – but it’s the start of another thing that Kaliya does so well. Find an important part of the tech world, where society needs to make progress, for the good of all, but where the various parties involved have not been able to communicate effectively, and bring them into communication.

In this case, it’s biometrics – using unique physical characteristics to quickly and reliably identify human individuals. You, dear reader, are probably in one of two camps: biometrics give you hives; or biometrics are a key, cornerstone technology for the future.

Kaliya says that the use of biometrics is not going away, and so, how about we get both sides together and figure out how to use the technologies with care and foresight?

Scroll down on the TBW page to see who should be interested and who should attend this workshop.  I’m so glad that it’s Kaliya who is taking on this challenge, after her careful stewardship in the identity space.

– Pete Kaminski – Collective Sense Commons

FTC on Commercial Surveillance and Data Security Rulemaking

Kaliya Young · September 8, 2022 ·

Today, Sept 8th, the FTC held a Public Forum on commercial surveillance and data security and I made a public comment that you can find below.

I think the community focused on SSI should collaborate together on some statements to respond to the the FTC advance notice of proposed rulemaking related to this and has a series of 95 questions (in federal register or on the FTC site) that it invites written public comment on by October 21st. Here is a 3 page fact sheet about what they are focused on.

The Federal Trade Commission (“FTC”) is publishing this advance notice of proposed rulemaking (“ANPR”) to request public comment on the prevalence of commercial surveillance and data security practices that harm consumers. Specifically, the Commission invites comment on whether it should implement new trade regulation rules or other regulatory alternatives concerning the ways in which companies collect, aggregate, protect, use, analyze, and retain consumer data, as well as transfer, share, sell, or otherwise monetize that data in ways that are unfair or deceptive.

– federal register

Here are my Comments:

Thank you, My name is Kaliya Young and my online handle is “Identity Woman” – I have been working for 20 years on the challenge of how people can control and represent their digital selves online with dignity and be empowered. I co-founded the Internet Identity Workshop in 2005 and continue to convene it every 6 months. 

A lot of of the questions put forward relate to regulating these “bad things” happening by companies to people. I also encourage the FTC to take a forward looking approach by consider the work of values based technical communities working on alternative mechanics for data sharing between consumers and companies. 

Two projects I advise Dazzel Dao and JLINX are seeking to end surveillance capitalism via open standards and open source tools to: 

  1. Give people tools collect of data that they generate in the digital world
  2. Being able organize and get value from THEIR data from a range of sources 
  3. and ways to share data under the consumer’s control with companies they trust in with new mechanisms to technically withdraw consent for having the information. 

Rule making should support these positive constructive efforts of ethical technologists. 

—————-

The risk of technology are often not seen until it is too late – I want to bring the Commissioners attention to a key issue that they could help with under the rule making related to data security as it relates to digital wallets – needed for the exchange and sharing of data between consumers and companies via protocols like Verifiable Credentials. 

There is a very real risk that because two companies control the mobile handset operating systems – Apple and Google – the will work to limit access to the APIs within the phone  preventing any wallets created by other companies working well.  

This doesn’t have to happen and the risk of it happening will be reduced if the FTC gets involved to ensure a level playing field for wallet makers – and ensuring consumers will have a choice of who they trust with the sensitive data about who they transact with across the digital world. Thank you.  

Being “Real” about Hyperledger Indy & Aries / Anoncreds

Kaliya Young · September 7, 2022 ·

Executive Summary

This article surfaces a synthesis of challenges / concerns about Hyperledger Indy & Aries / Anoncreds, the most marketed Self-Sovereign Identity technical stack. It is aimed to provide both business and technical decision makers a better understanding of the real technical issues and related business risks of Hyperledger Indy & Aries / Anoncreds, which have not been shared and discussed openly or publicly as the author believes need to be.

Who I am

My name is Kaliya Young. You may know me as the Identity Woman. I have been working on user-centric identity and most recently Self-Sovereign Identity standards for the past 20 years. Something fun has started to happen in recent years at identity events, more people who don’t know me are asking me if I have heard of or been to the Internet Identity Workshop (IIW), the landmark community forum for identity standard development I co-founded 17 years ago and still co-lead today. 

As someone who didn’t come from a technical background and doesn’t write code, I have made tremendous efforts to reach where I am today, able to explain technology accurately and facilitate deep technical discussions and collaborations. For years, I have participated in technical sessions and engaged myself in all types of forums in technical communities building user-centric identity to learn about technical details and ask questions.

I have exerted determination and persistence throughout my career, because I deeply care about what I do, and I feel that I owe it to those who have helped me become a community leader to do what I believe is right. They don’t always share the same views with me but they believe in my genuine intention and my capability to provide unique value to this emerging area of technology. I have deep respect for all of them and others who have been working diligently to make user-centric identity a reality, many of whom helped shape the narratives of this article when they knew they might be affected by its release.  

Here, I thank all of you who helped me capture the technical details in a truthful manner in this article, and my business partner, Lucy Yang, who supported me in making the difficult decision to write it and helped review and edit it. 

How Open Standards Get to Market 

Open standards are developed by a large technical community of people who see the need to lay some foundational ground of how to do a particular thing (If you are not familiar with open standards, here is a podcast that may be helpful). Due to the scale of efforts and influence, it always takes time for open standards to emerge, evolve and mature. A mature standard needs to go through multiple versions of iteration spanning across at least a decade or even more. During this time, you see a community of business and technical developers, normally a growing one, implementing and marketing a standard in many different ways and then feeding their experience back to the standard group in order to shape the next generation of the standard for the better. 

Self-Sovereign Identity (SSI) has just been through its first six years of early exploration, during which we see several paths of technology implementation emerge, co-opetition (cooperation between commercial competitors for their mutual advantage) happens, and convergence takes place in time. The W3C Verifiable Credentials (VCs) standard is a good example with the existence of different flavors of VCs (You can find more about the VC flavors in this article I wrote and the associated infographic I developed with Lucy). 

If you are a business decision maker looking into SSI, you may wonder if these technical choices matter, especially when the standards are at their early stages. The answer is yes, because all these implementation experiences are going to influence where the standard goes in the future. When a poor technology choice today later becomes a part of a standard, it will have a pervasively negative impact on all of us. It is essential for the pioneers of an industry to make choices to implement and explore possibilities as well as conduct honest critical evaluation of those choices as they meet the real world, so that the next generation of standards can take this into account as they evolve.

I have encountered business leaders who believe in the absolute power of market forces, thus making business decisions without knowing enough or at all about technical details, as well as technical leaders who see market dominance as the solution to a troubled path. While it is true that the market in general rewards whatever is marketed the best, not necessarily built the best, it is also true that critiques for and against different options is an important part of how a market should function, because many want to avoid another market success like the browser cookies, which has turned out to be a “disaster” for netizens.

I believe that those who picked early and explored a pathway on the landscape of potential should all be applauded – it takes a lot of courage to heavily invest in an implementation path at the very early stage of standard development. If the path doesn’t turn out well, it will have a significant impact on the business(es) of those who make significant early investments, especially if they need to abandon most of what they have built. The decision to pivot the technology becomes even more difficult if one has a relatively sizable business, a client and partner base relying on their technology, a group of early investors, and a market leader reputation to maintain. Because of that, it is almost understandable why some want to hold on tight to a problematic path even when they are aware of the issues with their technology stack. And it is with this understanding and respect for all early adopters / implementers that I am writing this article about Hyperledger Indy & Aries / Anoncreds, which so far has been the most-marketed SSI technical stack but not built as well as marketed nor the best one in the market.

Being “Real” about Hyperledger Indy & Aries / AnonCreds 

Hyperledger Indy and Aries are two open source projects at the Hyperledger Foundation, a sub-organization of the Linux Foundation. Together with Hyperledger Ursa, the three projects form the core blockchain-based SSI stack at Hyperledger. Aries and Ursa initially originated from Indy, but later became separate projects focusing on different technical aspects:

  • Indy is a combination of Indy SDK (crypto and ledger communication library) and Indy Node (the ledger implementation code). The Indy blockchain holds the credential schemas and Decentralized Identifiers (DIDs) of issuers and potentially governance registry listings. 
  • Aries is the code for agent applications that all actors in the identity ecosystem can use – issuers, holders and verifiers. This code writes to Indy ledgers and facilitates data exchange, making Indy and Aries a couple tightly implemented together. 
  • Ursa is the cryptographic library used by Indy and Aries. 
  • Anoncreds (ZKP-CL) is a low-level protocol for data exchange that defines data model (VC flavor) and interaction workflows that Indy and Aries use.

I am going to surface a synthesis of challenges / concerns about Hyperledger Indy & Aries / Anoncreds that many have found and brought to my attention. These concerns have existed for some time and have caused friction internal to the community without much public knowledge of them. As SSI is becoming more widely considered by governments, businesses and others around the world, I feel the professional responsibility to raise these lesser-known issues of the most marketed technical SSI option and say them out loud. It is important for anyone considering Hyperledger Indy & Aries / Anoncreds to know and understand these issues and their related business risks before making their decisions. 

1. LACK OF STANDARDIZATION AND WEAK STANDARD ALIGNMENT

•  No well-documented and agreed-upon specification

Open source code and open standard are two different things. Open standards define a recipe that allow people to implement the same thing in different ways, whether open source or not. By following the same recipe, we ensure some very basic interoperability across software / internet applications, for example, we can send emails from Gmail to Outlook. This interoperability is very important for identity credentials, as we need to use them pretty much everywhere. 

Indy / Aries have only been open source code bases that didn’t go through a standardization process to have a well-documented and agreed-upon specification. Those who don’t want to use the code bases can implement what they think the recipe is at their own risk, creating potential interoperability and other challenges down the road. And there is no specification for the Anoncreds format (implemented in the Indy code base now) that could be used to test different implementations, and there is no alternative implementation of Anoncreds to Indy. One can use wrappers to implement the Indy code into another programming language, but this is most likely going to cause memory management and error handling issues, making it hard to build stable software.

Due to market pressure, the Indy / Aries community recently started the standardization process for Anoncreds, years behind other credential formats that have already been engaged in standardization for years.

• Anoncreds (ZKP-CL) not aligning with the core W3C VC Data Model 

The core VC data model uses JWT or JSON-LD data formats, both leveraging the material in the credentials themselves and not needing to pull down a schema from a ledger for verifications. 

Anoncreds, which doesn’t use any standard data representation technology or VC data model(s), has its own format called ZKP-CL. The schema of this format is built using a JSON structure, but unlike the VC formats mentioned above, when a credential is created using ZKP-CL, the issuer must create a credential schema and write it to an (Indy) ledger for the credentials conforming to that schema to be verifiable. As a result, the verifiers have to get the schemas for the particular credential from the ledger and use that in the calculation to understand the veracity of the credential, making computation more intensive.

The discussion of Anoncreds 2.0 has been underway for several years, including a version of Anoncreds that uses BBS signatures, providing it some potential for adopting different VC data models. However, the progress on this effort has been extremely slow, and this effort will essentially mean reinventing the entirety of Anoncreds stack (Indy SDK and Node). 

2. LACK OF TECHNICAL RIGOR

• An old, less performant signature algorithm that is not suitable for a new product

Indy & Aries / Anoncreds is using a signature algorithm called the Camenisch-Lysyanskaya (CL) signature, based on the work by Jan Camenisch and Anna Lysyanskaya published in 2001-2004. CL-signatures uses 2048-bit keys based on RSA cryptography, which is actively being phased out, deprecated, and marked as “legacy” algorithms in some contexts. It is questionable to put it into new technical deployments that are at the beginning of their lifecycle. 

CL-signatures, slower and less performant than its modern alternatives, can lead to a set of trade offs that create security issues. For example, key sizes have to be larger to ensure security, requiring more bandwidth to transmit keys around. The larger key sizes also cause slow validation / transaction time (up to 7 seconds for a validation and approximately 30 seconds for credential definition generation when a new issuer is provisioned). The computing requirements also result in the need for powerful user devices for wallets, which means only users with powerful enough mobile devices can use the technology.

Furthermore, CL-signatures are too special to be supported by mainstream secure enclaves and secure elements. As a result, there is no way to protect the cryptographic key material used for holder binding in hardware. That means protection against credential theft and impersonation is software-based only, which is not sufficient for substantial and high assurance use cases. For example, any legitimate user can extract their COVID credential along with its cryptographic commitment to the wallet (link secret) from their phone and sell it on the Internet, meaning potentially millions of users could present a false credential. Given the unlinkability of Anoncreds, it would be impossible to determine which credential was sold – so it cannot be revoked to stop the fraud. 

Reputable government agencies such as NIST (US National Institute for Standards in Technology) and BSI (German Federal Office for Information Security) have never approved CL-signatures for government use, an indication that many government projects won’t be able to adopt Anoncreds in its current form, which has a dependency on CL-signatures. 

• No proper review and audit of the CL-signatures algorithm implementation

It can take years for new cryptographic curves and primitives coming out of academic work / paper to be ready for scaled deployment in real-world environments. Products that leverage cryptography, in order to ensure safe deployment, normally have a particular life cycle development pathway involving massive testing and vetting by experts.

When Hyperledger accepted the proposed Indy implementation as a donation, the CL-signatures was not battle tested to the same degree as more commonly used cryptographic schemes such as Ed25519 in TLS to secure the Internet or secp256k1 to secure billions of dollars of assets on Bitcoin and Ethereum. There were a significant number of steps missing, including an audit and peer review by cryptographic expert communities. For example, the Internet Engineering Task Force (IETF), a major standard organization for technical standards that make up the Internet protocol suite, delegates its cryptographic audit and review to IRTF Crypto Forum Research Group (CFRG). 

Rigorous testing is particularly important for implementation of cryptographic products since most often cryptographic issues emerge from the actual libraries / code bases of cryptographic operations which expose unsafety and vulnerability, rather than the cryptography itself.

• Miscommunication and overhype about link secrets and their role in subject-holder binding

Indy & Aries / Anoncreds implemented an “innovative” idea that embeds a “link secret”, a long number (same for every credential issued into a wallet), within another long number (different for every credential issued into the wallet). This has been communicated as the secret sauce that one implements Anoncreds can use to prove credentials in the same wallet are issued to the same person. This is not only an inaccurate depiction of the capability of the technology stack (as explained in an earlier point regarding CL-signatures) but also a miscommunication of the value of link secrets. 

As a matter of fact, link secrets can only ensure that two credentials share a common secret value. One could have two people use the same wallet to collect different credentials, or create a link secret that is in two different wallets and present attributes of credentials from both wallets. In these scenarios, verifiers won’t be able to know if the credentials in the same wallet are issued to the same person. Therefore, even though link secrets can provide value, it is important we have an accurate understanding of its value and don’t rely on/communicate the mechanism for assurances it can’t provide. 

This communication gap creates expectations and misplaced assumptions that could lead to significant security issues. An IEEE paper in 2019 explained it in more depth.

3. SERIOUS TECHNICAL, SCALABILITY AND GOVERNANCE ISSUES

• Indy & Aries / Anoncreds was constructed in a way that limited cryptographic agility or “upgradeability” or maintainability or extensibility or portability

Cryptography in large-scale applications has grown progressively more modular over the last decade or so, making it possible for a specification and technology stack to swap out the old algorithm for a new one. 

However, Indy was designed to conflate data representation with the cryptographic algorithmic implementation, making it cryptographically fragile – when the algorithms are cracked, the whole stack breaks. There is no “next algorithm” to migrate to relative to the same data structure. This means that when it does break, the whole stack needs to be re-built from scratch. 

Therefore, it is a normative best practice to use cryptographic signatures around data in a way that does not conflate a data representation with the cryptographic algorithms. Some well-specified options include Data Integrity (DI), CBOR Object Signing and Encryption (COSE), and Javascript Object Signing and Encryption (JOSE).

• Indy is not able to support large-scale issuance, verification and revocation

Indy was originally built to be single-threaded so that it could support a native token for in-network economics that required double-spend proofing. However, this significantly impacted Indy wallets’ ability to support large-scale implementations. Some implementers validated this scalability issue through their own experience, for example, using the Indy SDK to issue a bit over 18,000 credentials, which ended up taking four hours. One can potentially improve the situation by implementing Aries Askar, which is a standalone solution not pluggable into the Indy SDK.

On the verification side, if 1000 people log into a website at the same time, the verification speed will be very slow and cost prohibitively high. When looking at high scale applications such as the New York COVID certificate application which needed to support millions of verifications per day, an Indy ledger would just fall over. 

The credential revocation scheme of Indy is not scalable at high volumes either. One always has to balance performance / functionality with user privacy. A large batch size of revocation list, e.g. 10 million revoked credentials, will better guarantee user privacy through obfuscation and effectively prevent tracking of users on-chain. However, an implementer of Indy said that they could only set the batch size at 10K credentials to keep a reasonable performance. An additional issue on the mobile side – larger batch size will result in larger tails / cryptographic file that a user needs to download from the Indy ledger. 

You can find a research paper that came out in April 2022 here, which documented very clearly the scalability issues with Indy ledgers and the approach of how verifications are processed using on-chain located schemas for credentials:

“We conclude that issues of Trust Registry scalability have multiple facets. While Hyperledger Indy captures data useful to underpin a decentralized identity scheme, the knock-on effect of its scalability limitations may indeed place constraints on properties of security and decentralization. The current credential verification process relies on transaction processing by a ledger with transaction processing bottlenecks, which may constrain the ideal of non-repudiation.”

• Indy networks have a governance and economic issue 

One of the features people like about blockchains is that they provide for a network of nodes that all agree on a certain state – this means that people are not depending on one database or trusting one party to maintain it. Different parties can work together to maintain a network that all trust. Different ledgers can scale to different sizes of node networks. The Bitcoin network has tens of thousands of nodes for example, across “light” and “full” nodes.

Recent years have seen major advances as node-networking and consensus mechanisms evolve in tandem to power global blockchains. However, if you run an Indy network with more than 25 active write and consensus nodes operating at a time, performance plummets. The limitation poses serious governance issues as it is nearly impossible for Indy networks to have more than a small number of nodes in active operations.

Another major governance issue comes from the configuration of Indy’s auth_rules. By default, it takes one “Trustee” to do almost anything other than freezing the network (which takes three trustees), such as removing DIDs, changing any rule, setting fees, minting tokens, and / or even adding new trustees. Most Indy networks have adjusted the number from one to three “trustees” as the number required to do anything. This means you only need three individuals to collude to take down the entire network, or three individuals’ emails to phish to take down the entire network, or three trustees to erase information from the ledger. There have been Indy networks where more than half of their trustees all come from the same company – meaning that company effectively controls the network. 

The governance issues plus technical challenges make it hard for Indy networks to make any economic sense to exist as stand-alone ledgers just for storing credential schemas and DID Documents. That is why some early Indy networks have faced concerns of going down because there are not enough people/organizations wanting to operate nodes.

• Aries has limited adaptability for mobile

Beyond the above-mentioned computing requirements caused by the CL-signatures that lead to limitations on the mobile device side, there are also limitations at the application development level.

Aries is an umbrella of several agent frameworks written in different languages, which differ in feature set and community support. It is not possible to incorporate Aries into a native iOS app because there is no “Aries Framework Swift” (Swift is the native programming language for iOS), so nobody with a native iOS app can add an Aries wallet to it. This severely limits its adoptability. Some have tried to develop an Aries Framework Swift but gave up due to a multitude of challenges. 

The only two Aries frameworks that work on mobile today are React-Native and Xamarin (not actively supported anymore), which power a decreasing number of mobile apps in the market, as native Swift and cross-OS Flutter take up more and more market share in recent years. 

Additionally, due to the large number of external dependencies Indy has, such as OpenSSL, Libzmp, a React-Native wallet installing the Aries libraries can take up 70+ MB space, a huge amount for those who don’t have the latest iPhones. The external dependencies also make it a pain for developers to support mobile platforms with Aries. 

Finding a Way Forward Together as a Community

I am releasing this article right before the Hyperledger Global Forum in Dublin, Ireland from September 12-13, 2022, where I am speaking on multiple occasions about Self-Sovereign Identity / Decentralized Identity. I look forward to engaging there with anyone about this article, whether you are happy to see these issues finally being publicly shared or concerned about how it will influence your business. 

I have rooted my entire career in this community and care about all of you who are working hard to make our common mission a reality. As the world is paying more attention to our work and eager to work with us, I am committed to helping us find a way forward as a community.

Seeing Self-Sovereign Identity in Historical Context

Kaliya Young · June 21, 2022 ·

Seeing-Self-Sovereign-Identity-in-Historical-ContextDownload

Abstract

A new set of technical standards called Self-Sovereign Identity (SSI) is emerging, and it reconfigures how digital identity systems work. My thesis is that the new configuration aligns better with the emergent ways our social systems in the west have evolved identity systems to  work at a mass scale and leverage earlier paper-based technologies.

To make this case  I trace two different histories. The first follows the ways in which  identities were designed and managed in computer systems.  The innovations in SSI are a major breakthrough in the design of computer identity systems. The second history examines the evolution of paper-based identity systems that emerged in Europe. This section integrates  recent scholarship about the emergence of a particular social-psychology that came with  the first paper-based identity documents. This work explains what paper based identities meant and why they were accepted and made sense to people. The last section of the paper brings these two histories together and explains why the underlying technological design of SSI aligns  with Western liberal democratic values in a way that the earlier digital identity systems designs do  not.

Introduction 

Developers and policymakers think about social and technological systems as a given in the present moment. The assumption that current systems are a given applies to paper-based identity systems, digital identity systems, and the social systems that we relate to and use to form our identities. This paper adopts a materialist approach that sees all things as the result of processes.  

The first section of the paper reviews the basics of Self-Sovereign Identity (SSI) technology for readers unfamiliar with it —however, it is not intended to be a history of how SSI developed. 

The second section of the paper provides a view of how digital identity systems have evolved since the emergence of computers. This section makes critical differences between those earlier systems clear for non-experts. For example, the new self-sovereign identity systems reduce the inherent opportunities for tracking and, therefore, the privacy risks of earlier digital identity systems and the current dominant technical architecture of enterprise identity and access management. 

The third part of the paper looks at the history of paper-based identity systems that are in widespread use today. It explains  how they work and why they make effective trade-offs between accountability and visibility across systems. This section begins tracing  this history further back than most other accounts —beginning with the actions of the Catholic Church around 500 CE. This section integrates  recent scholarship about the emergence of a particular social-psychology present when the first paper-based identity documents were created. It explains they were accepted and made sense to people. It also walks through scholarship that tracks the material evolution of paper identity documents from when they first appeared to now.

The fourth section of the paper explains how SSI technologies differ from other models of digital identity management—particularly Enterprise Identity, Access Management, and the consumer IdP models. The primary difference is that SSI provides a way to express high confidence digital credentials in a digital format without anchoring identity information to identifiers such as network endpoints under the control of the state or some other corporate entity. SSI provides a way to restore the qualities of paper-based documents in the digital world: once issued to the individual, documents are under his or her control. Individuals can show their documentation to whomever they choose. In addition, SSI improves the efficiency and security of earlier identity systems by limiting the information that individuals must reveal to verify aspects of their Identity.

I am a practitioner who works day in and day out with technologists, business leaders and policy makers. I work in communities full of sincere people working hard to develop good designs for emerging digital identity systems. I am a “natural academic” and have read extensively across a range of disciplines, including those focused on systems design and understanding, and use my literacy in these areas in this paper.

The paper explains the underlying systems design of both paper-based and digital identity and explores qualities of each in a historical context. This includes exploring them both on their own and together where they intersect  in the real world as SSI-based systems designed by Western liberal democracies (New Zealand, Canada, United States, European Union). r.   

One can not reasonably write about identity without at least acknowledging the philosophical questions of identity. These have likely existed since human beings first achieved consciousness. We find them throughout all cultures in our myths, stories, religions, and philosophies. The primary questions being asked: “Who am I?”, “Am I more than just my body?”, and so on. I am setting aside these legitimate paths of exploration, choosing to ground human identity in a historical materialist approach. This approach sees “all structures that surround us and form our reality (mountains, animals, and plants, human languages, social institutions) as the products of specific historical processes.”

Before proceeding, I must emphasize that everything in this historical materialist tradition results from a process Every “thing” that you can point to, that you can identify, results from emergent processes over time. Our lives as human beings in bodies are the result of processes. The artifacts we create to point to or identify people in the complex society we live in—such as “identity documents”—result from these processes. Identity is a process. 

When discussing “identity,” the physical things identified seem central; however, the historical processes that shaped the document or technology used to express it are often forgotten . Documents containing “identity information” result from historical decisions, accidents, and innovations that helped organizations function. Both a human person and their identity documents have a physicality, but how they came to be, the process of their creation, is as important as their “thingness.” 

I introduce this anchoring frame of understanding historical processes because I will use it throughout the paper to explain the processes of various identity systems. By looking at processes, crucial differences between these systems can be seen and understood. If one simply looks at the “things” or resulting artifacts, the differences are less obvious. Different identity architectures are arrived at through processes that have different implications for people and interact with the power relationships between people and organizations.

Self-Sovereign Identity Technology

The following is  a brief, overview of SSI. It is not a history.  For that I recommend Chapter 16 in the Self-Sovereign Identity book. This section covers the basic architecture and core standards of SSI so that: a) the contrast between SSI and other systems can be discussed in the technology section, and b) the appropriateness of SSI to replace paper-based identity documents can be explored in the final section. 

Verifiable Credentials

Verifiable Credentials (VCs) is a World Wide Web Consortium (W3C) specification that defines a universal data format for digital credentials and how to share proofs of their authenticity. A credential can assert anything that an entity wants to assert about another entity and is adaptable for many purposes. An example of a government issued credential is a birth certificate. An example of a credential from civil society is a professional association membership; an example of a commercial credential is a loyalty card from a store; and an example of an employment credential is an employee badge. 

Figure 1. Verifiable Credentials diagram from the W3C specification. 

The issuer of the credentials and the receiver of the credentials (Verifier) do not need to directly communicate because of the clever use of public-private key cryptographic technology. The Issuer uses their private key to seal the credentials before issuing them, as structured data, to the Holder. The Holder stores these credentials in their Digital Wallet. As with a physical wallet, the Holder can choose to present the Verified Credentials stored in their Digital Wallet to anyone. 

When the Holder of the credential wants to present them to any receiver/acceptor (called a Verifier in this model), the Holder sends over a verifiable credential presentation. Then, using the Issuer’s public key, the Verifier runs a mathematical computation to check that the data structure originated with the Issuer, who controls the requisite private key associated with the public key, and that it has not been altered. The Issuers share public keys widely (sometimes via blockchain), so the Verifiers can use mathematical calculations to verify the authenticity of the Holder’s verifiable credential. 

Since the initial compilation of version 1 of the Verifiable Credential specification (2018), developers have expanded its effectiveness to better preserve privacy. Holders can now present particular pieces of information instead of the entire credential. So, a Holder could, for example, show just their age in years and not their birthdate. Or, a Holder could prove they served in the military but not have to share in which branch they served  or the dates of their service. Or, a Holder could prove they were a student at a particular school but not reveal their student number. This type of sharing is called selective disclosure. 

Decentralized Identifiers

A management application and associated storage are needed to support the exchange of Verifiable Credentials and cryptographic key materials associated with the Issuer. The application also has to leverage cryptographic key material generated and managed by the Holder, but never stored with anyone. 

The management of this type of material is difficult. Earlier systems used special key registry services that published the public key associated with a particular email address. People who wanted to send a cryptographically secure email to a given address could use the public key associated with the sender’s email address. To decrypt a message from a particular sender, the receiver would look up the sender’s public key and know that it came from that sender. The scale of key management for a Verifiable Credentials system is vast.  A database, like the MIT key server, or a website, like keys.openpgp.org, does not scale,    Relying on such a centralized service would make the system brittle and vulnerable..

On top of that, keys associated with an email address are anchored to a globally centralized system. Innovators of SSI technology decided to store, and manage, keys in a way that is both scalable and accessible but not controlled by a centralized authority. 

Developers need to provide users with persistent identifiers and pointers to cryptographic keys. Still, administrators also need to reassign different keys to an identifier when updating content that those keys unlock. Developers cannot store cryptographic keys in a fixed database assigned to an email address, like the MIT key database described above. Developers need to find another level of abstraction, so that the cryptographic keys can be rotated over time in relation to persistent decentralized identifiers. Blockchains collectively manage databases (either permissioned or permissionless) that once written are not erasable. Although Verifiable Credentials can be issued without decentralized identifiers or blockchains, together both of these innovations provide a beneficial common standard for sharing keys in a resolvable way. Here is a description from the W3C Standard.

Decentralized identifiers (DIDs) are a new type of identifier that enables verifiable, decentralized digital Identity. A DID identifies any subject (e.g., a person, organization, thing, data model, abstract entity, etc.) that the controller of the DID decides that it identifies. In contrast to typical, federated identifiers, DIDs have been designed so that they may be decoupled from centralized registries, identity providers, and certificate authorities. Specifically, while other parties might be used to help enable the discovery of information related to a DID, the design enables the controller of a DID to prove control over it without requiring permission from any other party. DIDs are URIs (Uniform Resource Identifiers) that associate a DID subject with a DID document, allowing trustable interactions associated with that subject.

Each DID document can express cryptographic material, verification methods, or service endpoints, which provide a set of mechanisms that enable a DID controller to prove control of the DID. Service endpoints enable trusted interactions associated with the DID subject. A DID document might contain the DID subject itself—that is, if the DID subject is an information resource, such as a data model.

This [specification includes] a common data model, a URL format, and a set of operations for DIDs, DID documents, and DID methods.

Figure 2. The diagram of the relationship between key components of a DID and DID Document from the W3C DID Specification. 

Decentralized identifiers sit in stark contrast to earlier systems of identifiers that were permanently anchored in either globally managed registries (e.g. Domain Names in the DNS via ICANN or Phone numbers via the ITU-T) or within private namespaces such as usernames at websites (within the domain name system), Twitter handles, or Instagram handles.  

The Decentralized Identifier is a breakthrough in technical architecture that centers control of the identifier within an entity itself (via the software it controls). Identifiers do not need to be assigned by some outside issuing authority; the entities themselves can generate identifiers. Ownership of these identifiers can be proven independent of any “issuing authority.” This proof is achieved by using the properties of public-private key cryptography. 

Decentralized Identifiers do not have to be stored on a blockchain to be valid. The public keys associated with a DID, created and owned by any entity (person or organization), can connect to any other party. Pair-wise, these connections can be unique to the two parties. A specification under development called DIDComm will standardize this type of communication. 

DIDComm sits in contrast to several antecedent technologies, like the cryptographically secure email via PGP. Email via PGP publishes an associated public key, in a publicly accessible way, on a key server. All messages sent  to that address use that key, making it non unique per connection. DIDComm is also distinct from widely used messaging applications that use unique keypairs per connection, like WhatsApp, Signal, and Telegram. These applications avoid user names/identifiers and “cheat” by leveraging phone numbers as a persistent identifier that can identify users in the network. They also do not exchange unique keys per connection with other parties – but rather have a singular public key they share and use for all their connections.

The Historical Evolution of Identity in Computer Systems 

The earliest computer systems were developed and used by business enterprises or organizations, like research institutions. The first computer systems, like the Colossus and Eniac, were created in World War II. They were so rudimentary that there was no need for a “user account.” Shortly after that, large mainframes were developed  to support more than one user interacting with one computer system. Developers invented user-names and passwords to manage access. As a logical next step, the ability to write messages to other users of the same mainframe computer was invented by those early users. These messaging systems were the antecedents of email.

In the 1970s, with the creation of the ARPAnet, large computer systems began to link together by a protocol stack called TCP/IP. By using these connections, users could send messages between computer systems in different cities. Because messages could be transmitted between people in different locations, standards were developed to manage those messages. The standard for transferring messages between computer systems on the Internet is the Simple Message Transfer Protocol (SMTP), which is still in widespread use because it creates a way for anyone with an email address to send a message to anyone else with an email address. These early ARPAnet users began a naming system so that human-readable names could be mapped to Internet Protocol (IP) addresses, making email usable for people. Addresses took the form of “user name_@_institution name_._type of institution_.” By default, messages are not encrypted. In the 1990s, PGP key servers were developed to add encryption.

As computer systems within the enterprise became more complex, multiple programs ran on a single large system. Eventually, users needed a single login that would let them access a whole variety of services included in  enterprise systems. This led to protocols to manage the complexity of the enterprise. LDAP (Lightweight Directory Access Protocol) supported the maintenance of directory services so that information about users could be used throughout the enterprise. 

Another protocol called SAML (Security Assertion Markup Language) supports federated authentication and authorization both within enterprises and potentially between enterprises. SAML helps manage who has access to what systems. These internal federation architectures, using SAML and LDAP, were the dominant methods of identity management because they made sense in the context of enterprise computer systems. 

These digital Identity management solutions emerged within social and cultural power structures, like employment, where having control “over people” by controlling their identifiers aligned with the power to hire and fire them. Employees did the work for the enterprise—they were not a free persons acting in a social universe of peers and associates or as business customers. Because these original architectures were well-established beginning in the 1990s and solidified in the early 2000s, they shaped the thinking of many identity management professionals about how identity management in the digital realm could be done. 

The architecture of assigning users an identifier and managing it for them was first used not for the consumer internet, but within enterprise systems. A whole field of enterprise identity and access management arose before the web even existed. This control architecture is still widespread and makes sense relative to the inherent power relationship between employees and employers. Companies hire employees to do work. In exchange for that work, they are paid wages. When an employer is not happy with an individual’s work or simply does not have enough work to be done, they will let an employee go. This dynamic of hiring and firing is designed to meet the needs of the enterprise. 

When the employee’s work involves interacting with a computer system, it makes sense that the employer provides access to that computer system. This assignment is made via an identifier/employee number assigned by the employer to that employee. The employee could leverage a shared secret (password) when seeking to access the system doing what is called authentication and then given authorization. Then when the employee no longer works for the company, this digital representation for the employee in the enterprise system should be terminated so they can no longer access the systems – authorization is denied. In other words, access to the system should end for the person who is no longer an employee.  These control structures are part of the original enterprise identity and access management. 

When the first consumer internet arose, companies like AOL and Compuserve offered accounts to users. Social media companies still use this  same system today. Users get this type of identifier when they go to a new service and choose a username within a service’s namespace. This identifier sits within the issuer’s namespace and domain of control. This means that the issuer can terminate the subject’s access to that service’s namespace. 

After picking a username, the user chooses a password. The password is thus a shared secret that both the user and the service know (but no one else). Finally, when the user asserts they are the entity in control of a given username, the service challenges them to also present the shared secret (i.e., the password). In recent years, there has been a push to support the wider adoption of additional authentication factors, some of which use cryptography (like RSA tokens or Yubikeys). However, the process of two or three-factor authentication still involves proving control of an identifier managed by the Identity Provider. 

Figure 3. This diagram shows a Sole Source Topology for Identity where the individual gets new separate accounts for every service they interact in—resulting in individuals having dozens if not hundreds of different accounts at different services and needing to manage just as many user-name and password combinations. 

This way of managing identity has architectural control properties quite similar to the enterprise control over employee accounts. Federation expands the use of the identifier beyond the one site or service. Services known as Relying Parties encourage new and returning users to leverage an account from another service. These Relying Parties require that users prove they have control of an identifier on that service. Once control is proven, the users gain access to the Relying Party’s site. A standard called OpenID was invented at a conference facilitated by the author to support this type of transaction. It led to the proliferation of “sign-in with” buttons, which let users use their Facebook, Google, LinkedIn, Twitter, Github, or other ID to log into a range of websites.  

Figure 4. The flow of an OpenID Connect connection that has an Identity provider. 

While this model, in theory, leads to a variety of Identity Providers, in practice, very few emerged because of the “NASCAR Problem.” Only a few Identity Providers can fit on a given login screen, so users have very few choices for Identity Providers. 

Self-Sovereign Identity technology stands in stark contrast to its antecedent technologies:  topologies  of single-source identity and identity federations. SSI differs from earlier digital identity systems because the receiver/accepter of a credential can be assured of its veracity without directly connecting to the issuer. Receivers don’t have to make a phone call to check a document, and they don’t have to establish a technical federation using a protocol like SAML or OAuth to ping a database of the issuer. 

It is also worth comparing these digital technologies with the embodied Identity of humans. As human beings navigate a social world in physical space, they show up in their physical bodies, associated clothing and are recognized by others. In effect, their bodies and clothes are an “authentication factor” because our memory of people is tied to their physical form. When the physical world’s social, human process in the physical world is translated into the digital world, identifiers are assigned to people by organizational entities that ultimately have control over those identifiers. This means that people are becoming disconnected from their social world, where Identity is individually asserted and socially recognized. The platforms that host, manage, and control our digital identifiers are within their rights to delete our digital identities and even reassign our identifiers to others. We are not free people in these systems because we are directly under the authority of these mega identity providers.

Figure 5.  This diagram shows how the identity providers dis-intermediates individuals from other organizations they connect with by logging in via their Identity Provider.

All the social platforms like Facebook, LinkedIn, Instagram, and Twitter manage their own name-spaces. These platforms also own the connections between the people who have accounts on their services. This means that the social fabric of our society, translated into the digital realm, is owned by these platforms and not by us—the people who are connecting to each other. 

DIDComm, explained above, can provide an alternative to this control architecture. With this new Self-Sovereign Identity technology, we the people own (via software we control) the digital identifiers we use to connect to other people. With SSI, we control and own our social connection, as expressed in the digital realm. SSI technology provides a reclamation of the social, digital commons from its enclosure by the mega-Identity providers like Google and Facebook.

Figure 6. The timeline of key points in the development of computer/digital identity systems from the first computer systems to the present day.

Contemporary Institutions and Paper-based Identity Documents 

This section looks at two phenomena: the origins of contemporary institutions and the origins of identity documents in relation to those institutions. Their histories are woven and interrelated. I am taking this approach because identity documents issued by various institutions are taken for granted, and it is assumed that “it was always this way.” Several years ago, a gentleman who works with the UN was on a panel at a conference asserting that “states have always issued identity documents to people.” This can seem true because, in our living memory, it has always been so. However, I had to pipe up as a ‘panelist from the floor’ to remind everyone that, in fact, the passport system was only started 100 years ago. It has emphatically not always been this way. So how did it come to be? 

Colin Koopman wrote in How We Became Data: A Genealogy of the Informational Person: 

I suggest that bringing the politics of information into view requires extending the scope of our historical analysis to the period preceding wartime information sciences and the postwar information theory to which they gave rise. 

Koopman, C How We Became Our Data: A Genealogy of the Informational Person

His book has a whole chapter about the origins of the bureaucratic birth certificate system we have today; his book looks at the history of forms and processes used in the US between 1913 and 1937. For this historiography, I want to push the timeline back even further to consider deeper questions about why systems of birth certificates and other forms of documentation appeared in Europe centuries earlier. I believe that we have identity documents because we have non-kin-based institutions that require identity documents to function. These two things – documents and institutions (which have governance mechanisms) – together help create complex networked contemporary society and, below, I make this argument in several different ways. 

I am drawing on recent scholarship highlighting the key emergent processes that created 1) new institutions in Europe and 2) the social psychology of people who saw themselves as “individuals” with “identities” of their own relative to these institutions. Identity systems created  by institutions predate any digital systems by millennia. Moreover, these pre-digital identity systems have a material logic informed mainly by the physical reality of paper, which was the available technology substrate to manage these systems.  

Many histories of modern identity systems often begin in the Middle Ages with letters of introduction, then move on to birth certificates, census receipts, and citizenship papers. We will get to that history. However, it is worth asking, “Why did these technologies of Identity make sense to the people who adopted them?” and “What happened in the preceding thousand years in Europe to make this technology of identity documentation acceptable?” 

To get at this more in-depth history, I draw on Joseph Henrich’s book The Weirdest People in the World. In it, Henrich describes cultural forces that were set in motion by the Catholic Church beginning in the 500s. Beginning around this time, the church imposed a marriage and family program (MFP) that banned cousin marriage. This eventually extended all the way to 7th cousins—they had the tools to do this tracking back seven generations (or 140 years) via baptismal records or logs. This documentation of who was baptized served as a precursor to the state issuance of birth certificates.  

As part of MFP they imposed other norms that prohibited close family members who were not blood related from getting married. My sisters husband is my brother-in-law. This term originates from the MFP and comes from this time – it was in church law that one was considered a brother. If my sister died and my brother-in-law wanted to marry me he would be prohibited from doing so even though we are not blood relatives but relatives according to the law (of the church).  

Keeping records to avoid cousin marriages, while an interesting antecedent to birth certificates, does not explain the cultural shifts that lay the ground for people thinking of themselves as individuals. The breakup of cousin marriages effectively broke apart intensive kin-based institutions that linked people together based on family ties. Without these kin-based institutions “to organize production, provide security, and endow people with a sense of meaning and identity, individuals were both socially compelled and personally motivated to relocate, seek out like-minded others, form voluntary associations, and engage with strangers.” 

As kin-based systems broke apart over hundreds of years, people moved to towns and cities and joined religious institutions like monestaries in much larger numbers beginning in the 10th and 11th centuries. It was in these places that proto-WEIRD psychology emerged, involving

analytic thinking and non-relational morality. These changes favored the development of impartial rules that granted privileges and obligations to individuals, while also creating impersonal mechanisms for enforcing trusts such as accounting records, commercial laws, and written contracts. The new social organizations created new ways for human social groups to be organized and operated that were not based on kinship ties. There was experimentation, and other institutions copied and spread good ideas.

 Below are the core elements Henrich describes as defining WEIRD psychology: 

1. Analytic thinking: This grew in importance as people navigated the world of “individuals” rather than dense familial interconnections, reducing the importance and value of holistic thinking. 

2. Internal attribution: As social life shifted to the individual, “traits like dispositions, preferences, and personalities as well as mental states like beliefs and intentions became important. Soon lawyers and theologians even began to imagine that people had ‘rights.'”

3. Independence and nonconformity: “In a society with weak kin ties and impersonal markets,” individuals focused on their uniqueness rather than venerating ancient wisdom and elders. 

4. Impersonal prosociality: With life being governed by impersonal norms for dealing with strangers, “people came to prefer impartial laws that applied to their groups or communities (their cities, guilds, monasteries, etc.) independent of older social relationships, tribal identity, or social class.” 

As beliefs and values changed, the material possibilities in people’s lives did too. As a result, new opportunities emerged for how society could be organized.  

“As intensive kin-based institutions dissolved, medieval Europeans became increasingly free to move, both relationally and residentially. Released to choose their own associates—their friends, spouses, business partners, and even patrons… Constructing their own relational networks opened a door to the development and spread of voluntary associations, including new religious organizations as well as novel institutions such as charter towns, professional guilds, and universities.”

Henrich, JosephThe WEIRDest People in the World: How the West Became Psychologically Peculiar and Particularly Prosperous, 2020. 

When looking at these slow, but over-the-long-run significant, social shifts, we can ask: “Why did identity systems of institutions emerge when they did, and why did people choose to adopt these technologies?” Because these newly emergent assemblages were not defined by familial/genetic ties, people needed to find ways to support defining who had entered the boundary of the institution. The institutions needed tools to remember who was part of the institution and who had left. E.g.: In the case of guilds, knowing who their members are; in the case of towns, knowing who residents are; in the case of the military, knowing who makes up the soldiers in military units; or in the case of hospitals, knowing who the medical patients are. The one technology available to do this was a paper-based record-keeping system. This commonly took two froms : log book lists or cabinet files. Both ways involved keeping track of who was in a social formation. These systems could also involve a letter or certificate given to the person themselves. In the case of university, institutions needed to track students as they matriculated through the institution, verify those students graduated from an institution with a degree, so they communicated that via paper certificates with the seal of the institution. 

This process of identity formation and boundary creation is not unique to human social systems, institutions, or assemblages, but also part of how biological networks function. 

Social networks exhibit the same general principles as biological networks. There is an organized ensemble with internal rules that generates both the network itself and its boundary (a physical boundary in biological networks and a cultural boundary in social networks). Each social system—a political party, a business organization, a city, or a school—is characterized by the need to sustain itself in a stable but dynamic mode, permitting new members, materials, or ideas to enter the structure and become part of the system. These newly entered elements will generally be transformed by the internal organization (i.e., the rules) of the system.

One way that these boundaries are created and sustained was via paper-based identity systems, and the rules of the organizational assemblies, in turn, shaped how identity systems were operated and  managed.  

“What processes stabilize and maintain the Identity of these assemblages? The spatial boundaries defining the limits of an authority structure are directly linked to its jurisdiction[…] The stability of these jurisdictional boundaries will depend on their legitimacy as well on their continuous enforcement.”

I argue that one of the processes and technologies that arose to stabilize and maintain the identity of these assemblages is paper-based identity systems. Because authority or governance was not based on kinship ties with these new organizations, they “had to decide how to govern themselves in ways that were both acceptable to current members and capable of attracting new members in competition with other organizations.” They did so by “developing laws governing individuals [and thus] developed well-functioning representative assemblies.” 

So, the need to manage who was in and out of these institutions also led to the emergence of novel governance systems because these new institutions emerged and innovated new mechanisms to define their boundaries and membership. This development laid the groundwork for the development of systems of democratic governance, which in turn also required a method of knowing  who was in the organization or assemblage. Today, we see that one of the hallmarks of democratic election systems is the publicly available voter rolls of who can vote and, once the election is completed, who actually voted. 

These systems of people interacting beyond their own kin lead to the emergence of pre-capitalism that developed “a growing repertoire of social norms and organizational practices [that] were cobbled together, described in charters, and formulated into written laws. Lex mercatoria, for example, evolved into commercial law.” These activities meant that strangers were doing business with strangers using contracts to access justice. To get this all to work, the parties with a contract must have a way to express their identity in the contract—one that is recognized by other individuals operating within the context—so they could, if need be, turn to those outside of the contract to help resolve disputes and manage enforcement. In Europe, this need for clearly expressing identity required  various paper-based documents that established Identity and included practices that emerged first around seals. In time seals  evolved to personal signatures that represented individuals’ decisions in a concrete form on contracts.  

Identity systems also serve a mechanism of cultural and meaning transmission over time. Social networks of humans interacting with each other exhibit the same principles as biological networks. “Culture is created and sustained by a network (form) of communications (processes) in which meaning is generated. The culture’s material embodiments (matter) include artifacts and written texts, through which meaning is passed on from generation to generation.”

For pre-digital identity systems, some of the artifacts used to construct meaning are paper documents related to identity information. These documents arise from the processes that institutions implement to create them. There were local authorities that registered births and issued birth certificates so that authorities could prove how old a child was (to prevent child labor) and who one’s parents were for inheritance purposes. 

These institutions are not “people” who are interacting with one another and using bodies as the known common factor to recognize each other. When returning to interact with an institution and its systems, people must represent themselves in a way that is understandable to the institution or more precisely to a person who is acting in a role with that institution. This is done by producing documents issued to the person by either that institution or another institution whose authority they accept. 

These institutional processes require some basic steps of enrollment or registration. Often an indexical number is assigned to an individual—this helps the institution find the records of this person again and add more information to the institution’s record of the person. Often when a person is interacting with institutions, other attributes about the person are often collected and recorded in identity documents, ledgers, and records kept by the institution.

There are several contemporary examples of institutional networks becoming explicit and understanding how people are enrolled with them and later return to represent themselves. In Canada work has been done by the public and private sector to develop a Pan-Canadian Trust Framework that articulates 24 micro-processes involved in creating an identity with high confidence in government-related systems. Global governing institutions like the International Civil Aviation Organization (ICAO) have set standards for Evidence of Identity and are seeking to standardize birth registration documentation globally. A whole range of institutions then use birth certificates that result from birth registration in order to recognize people. 

Modern nation-states and the identities that people have in relation to them emerged with the Treaty of Westphalia in 1648 as territorial states were recognized as legal entities. These entities, modern nation-states, are a relatively new emergent phenomena. They have a physical territorial form, but it is essential to remember that “human social systems[…] exist not only in the physical domain, but also in a symbolic social domain, shaped by the “inner world” of concepts, ideas, and symbols that arise with human thought, consciousness, and language[…]”  

It is important to remember that the state does not just  occupy land but that it also exists in the thoughts and beliefs of its subjects. These thoughts and beliefs arise through a process of social autopoiesis via an autopoietic network (self generating) and via communication:  

“Social systems use communication as their particular mode of autopoietic reproduction. Their elements are communications that are produced and reproduced by a network of communications and that cannot exist outside of such a network.”

Citizenship in territorial nation-states is a significant example of autopoiesis  in action. Mawaki Chango’s research shows that the initial issuance of identity cards to residents in the territory we call France was a crucial step in forming the idea that they were indeed citizens of a nation called France within those people’s minds. This process is replicated worldwide and shapes the beliefs of billions of people who are registered by the states where they live. 

It is worth noting that these state projects to register citizens also imposed naming conventions that we now take for granted. The inherited patronym was designed by states doing such record keeping in early projects to “allow officials to identify, unambiguously the majority of its citizens.” When successful, it went far to create legible people, and they remain the first recorded facts on documents of Identity. 

Here is a brief timeline of the evolution of both identity processes and their accompanying paper-based identity documents.

Figure 7 this presents a timeline of key developments in the history of paper-based identity documents. 

When individuals want to use  information about themselves asserted by one institution to gain access or services at another institution,  paper documents  are the pivot point of sharing that information. When I want to go to a bar and the bar needs to know how old I am—I present my drivers license at the door. The person at the door of the bar does not query a state level database to discern my age. The state has no idea where and with whom I shared my identity information. This is a diagram of how this works. 

Figure 8. This shows how paper documents are issued to and used by individuals. A person petitioning for a document will submit the needed requirements to the issuer (in the case of a birth certificate, the parents will fill out the forms and have the doctors sign them). The issuer, in this case the county registry, issues a certificate that the birth has been recorded in the county register. The individual seeking employment can prove their age by sharing this paper certificate with a potential employer – indeed this was the use case that motivated social reformers in the 1920s to push for universal birth registration that was achieved in the United States by 1940.

This section makes the argument that our current identity systems and their paper-based documents and processes cannot be separated from our complex interlocking institutions from which they spontaneously arose over millennia. We cannot “go back” at a global scale to peer and kin-based identity systems with no material artifacts. Given the pervasiveness of today’s digital technology, we cannot go forward with just paper-based tools to share and prove Identity with institutions that make our complex society function. So what options are there? The next section explores the incompatibility of the Enterprise Identity and Access Model and Consumer IdP model with the underlying architecture of paper based systems and argues that SSI models preserve important desirable qualities of paper-based systems.

The Path from Paper Based Identity Documents to Digital Identity Systems in Alignment with Western Liberal Democratic Values

The question of how paper-based systems can be replicated in the digital realm is not an easy one. If it was easy it would have been done years ago. So let us consider some potential paths that were present a decade ago.  

One could adopt the digital identity management systems and paradigms that emerged for managing the relationship between employees who needed access to digital systems to do their work as discussed in the first part of this paper. Employers assign employees an indexical number, an identity relative to their work at the company, and provision them with an account to access enterprise systems. By default, this enterprise architecture puts the employer “over” the employee with the power to see everything the employee does with their digital identity and terminate the employee’s digital identity in that system. 

So, it would follow in this model that governments can create digital identifiers that serve as persistent network end points for their citizens and then use this digital identifier and account to manage the citizen’s interaction with the state and all realms of life. This puts the state (itself an assembly of many organizations) in the role of providing digital identifiers to its citizens. Digital identities architectured in this way would be controlled and owned by the state. The government would have control over it in the same way that Google and Facebook have control “over” our digital social accounts, and in the same way that an employer has control “over” our accounts as employees in enterprise systems. 

This architecture doesn’t seem right and just within the context of Western liberal democracies. It allows the state to see  an enormous amount of the activities performed by an individual. t gives the state  the power to terminate the digital account and thus the “informational person,” a term coined by Colin Kooping.

Systems have emerged with these underlying architectural designs, and they all began more than 10 years ago before the SSI architectures were created. 
Some nation-states, tiny countries with highly accountable (and largely digitalized and online) institutions and high trust societies such as Estonia and Singapore, are pursuing this model. The central government issues  digital identifiers and leverages that national identifier across multiple contexts. The Indian government has enrolled the  majority of its residents into a system by collecting 13 biometrics (10 finger prints, two iris scans and a photo) from each of them and then assigning them a 12-digit identifier, Aadhaar number. The designers of India’s system imagined this number would be the center of the “India Stack” and could be used by people to login to all digital services both governmental and commercial. The World Bank has been promoting systems based on this model throughout Africa and offering substantial loans to support their implementation.

Figure 9. This is a slide from presentations by iSPRIT about how they envisioned the Aadhaar number of each Indian being at the center of a technology stack. 

The enterprise identity and access model that phones an authorized database repeatedly for authentication is not appropriate for the relationship between a citizen and their state. It is not a viable model for the exchange of information about people between all possible institutions within in a complex society. This is for three reasons: 1) the necessary  technical federation would be complex and vulnerable to cyber attack 2) the state can see all the transactions in which a citizen uses their account, and 3) the state can to terminate a citizen’s account his architecture doesn’t seem right and just within the context of Western liberal democracies. Campaigns against proposed digital identity systems with a centralized IdP design were waged in Australia and the UK successfully. 

When we look at how paper-based documents work, the individual was the pivot point in exchanging information from one institution to another. It is worth noting that institutions who receive shared information  (the Verifier) and want to be very sure the paper-based documents they are presented with are not a fraud might call the issuer to confirm the veracity of the documents. 

Self-Sovereign Identity technologies provide a way to restore key  qualities of paper-based documents in the digital realm. They make the person the pivot point for the exchange of information between institutions. Once issued to the individual, documents are under their control and can be shown to whomever the individual chooses. Verifiable Credentials have even better anti-fraud protections with digital signatures (so the Verifier does not need to contact the issuer). 

Figure 10. Self-Sovereign Identity specific use-case around the issuance and sharing of a verifiable credential in the educational context.

SSI bridges the gap between paper identity documents and digital identity documents in a way that does not put the state or any other institution in control of an individual’s identity. Individuals may issue their own identity documents without the approval of the state. However, to increase credibility, it will be common to share verified credentials with assertions from another party. The individual’s dependence on other parties for credentials is equivalent to their reliance on a community for their reputation in pre-digital times. This aligns with the emergent properties of social, institutional systems over the last thousand years in the European context.  

Figure 11. This shows the two different timelines of computer/digital identity systems and paper based systems.  They are two distinct histories with different needs and business processes that created each of them.  They can meet together in Self-Sovereign Identity  as its underlying architecture is similar to how paper based systems work  translated into digital. 

For better or worse, European models for many types of institutions have been exported around the world. The SSI protocol is broad and widely expressive. It is, as another name for it implies, decentralized, so any entity can use these open standards for any purpose they choose. This means that any institution, including kin-based and indigenous communities, could also use SSI to design credentials and issue them to their members on their own terms. Indeed, in New Zealand, a Maori-owned social enterprise, Ahou is exploring how express traditional kin-based Identity in this new digital format. They are also collaborating with the New Zealand government to have these identity documents recognized by them based on their historical treaty arrangements. 

In summary, SSI preserves or restores some features of earlier paper-based identity systems that emerged over millennia in Europe. Essentially, it provides a real alternative path to express credentials in a digital format that prevents the anchoring of identity information to identifiers as network endpoints under the control of the state or some other corporate entity. SSI improves the efficiency and security of earlier identity systems by limiting the information that must be revealed to verify aspects of Identity. It also reduces both the workload and the security risks associated with repeated checking between the issuer and the Relying Party to verify a credential.

The Future of You Podcast with Tracey Follows

Kaliya Young · May 4, 2022 ·

I was invited to discuss self-sovereign identity on Episode 7 of The Future of You Podcast with the host, Tracey Follows, and a fellow guest, Lucy Yang.

On this podcast, we discussed digital wallets, verifiable credentials, digital identity, anonymity and self-sovereignty.

  • Why digital identity is so important and how it differs from the physical realm
  • Tools currently in development to enable self-sovereign identities
  • Whether anonymity or pseudonymity is feasible while maintaining accountability
  • How digital wallets might evolve and consolidate across the public and private sector
  • The principles of physical identity that must carry over into a digital solution and the importance of Open Standards

Listen online: https://bit.ly/3w1cxbu

Listen on Spotify: https://spoti.fi/3vIB9qK

Listen on Apple: https://apple.co/3w3fqbN

Listen on Google Podcasts: https://bit.ly/3w0hWQ1

Listen on Amazon Podcasts: https://amzn.to/3KBBC29

Media Mention: MIT Technology Review

Kaliya Young · April 7, 2022 ·

I was quoted in the article in MIT Technology Review on April 6, 2022, “Deception, exploited workers, and cash handouts: How Worldcoin recruited its first half a million test users.”

Worldcoin, a startup built on a promise of a fairly-distributed, cryptocurrency-based universal basic income, is building a biometric database by collecting data from the financially disadvantaged in the developing nations, in exchange for cash incentives.

Below is the paragraph which I am quoted in, with regards to Worldcoin’s business.

Others remain unconvinced that Worldcoin can actually reach everyone in the world—and instead, serves as a distraction from ongoing work to create new identity paradigms. Identity expert Kaliya Young, while declining to comment on Worldcoin specifically, says that “it’s common for companies to claim that ‘if everyone in the world was in our system, everything would be fine.’ Newsflash: everybody is not going to be in your system, so let’s move on and talk about how we solve problems” in online identity.

You can read the entire article by following this link, https://www.technologyreview.com/2022/04/06/1048981/worldcoin-cryptocurrency-biometrics-web3/

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Interim pages omitted …
  • Go to page 56
  • Go to Next Page »

     Copyright © 2023 Identity Woman  evelurie.com/web design/develop     

  • Terms of Use
  • Privacy Policy
  • Sitemap
  • Contact