




版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領
文檔簡介
REWIRINGTHEWEBTHEFUTUREOFPERSONALD
ATAJONNASHCHARLIEHARRYSMITHJUNE2023OpenAccess.Somerightsreserved.OpenAccess.Somerightsreserved.Asthepublisherofthiswork,Demoswantstoencouragethecirculationofourworkaswidelyaspossiblewhileretainingthecopyright.We
thereforehaveanopenaccesspolicywhichenablesanyonetoaccessourcontentonlinewithoutcharge.Anyonecandownload,save,performordistributethisworkinanyformat,includingtranslation,withoutwrittenpermission.ThisissubjecttothetermsoftheCreativeCommonsByShareAlikelicence.Themainconditionsare:?
Demosandtheauthor(s)arecreditedincludingourwebaddresswww.demos.co.uk?
Ifyouuseourwork,yousharetheresultsunderasimilarlicenceAfullcopyofthelicencecanbefoundat/licenses/by-sa/3.0/legalcodeYou
arewelcometoaskforpermissiontousethisworkforpurposesotherthanthosecoveredbythelicence.DemosgratefullyacknowledgestheworkofCreativeCommonsininspiringourapproachtocopyright.To
?ndoutmoregotoPublishedbyDemosJune2023?Demos.Somerightsreserved.15Whitehall,London,SW1A2DDT:
02038783955hello@demos.co.ukwww.demos.co.uk2C
NTENTSACKNOWLEDGEMENTSPAGE
4PAGE
5PAGE
6PAGE
7PAGE
10PAGE
14PAGE
17PAGE
20EXECUTIVESUMMARYINTRODUCTIONREPLACINGPERSONALD
ATA
WITHTRUSTEDCONNECTIONSPRESERVINGPRIVACYENSURINGINTEROPERABILITYREQUIRINGMEANINGFULCONSENTCONCLUSION3ACKNOWLEDGEMENTSWe
wouldliketothankanumberofpeoplefortheirinputandfeedbackonthedraftofthispaper.
Theseinclude:KeeganMcBride,VickyNash,RogerTaylor,
JohnTaysom,
KirstyInnes,To
mWestgarth,LeoRinger,
AndrewBennett,SimonWorthington,MarkBembridge,AreeqChowdhury,JuneBrawner,
ElliotJones,ValentinaPavel,WillHayter,
BluebellDrummond,VincenzoRampulla,CaseyCalista,SamuelRowe,BryanGlick,DaveBirch,andIanBrown.AtDemos,wewouldliketoacknowledgetheassistanceofPollyCurtis,EllenJudson,andOliverMarshthroughouttheproject.ABOUTTHISPROVOCATION
PAPERThispaperproposesaseriesoftechnical,regulatory,
andinstitutionalinterventionsthatreimaginethefoundationsofamoderninternetbuiltonprivacy,
interoperability,andconsent.JonNashCharlieHarrySmithJune2023JONNASHJonisapoliticalscientistandentrepreneur.
Heco-foundedMainstream,alivevideostreamingplatform,withformerFacebookandABCexecutives,andwentontobuildapopularlocationbasedmessagingservice.HisresearchfocusesontechnologypolicyanddemocraticinnovationandhehasadvisedthegovermentonreplacingGeneralDataProtectionRegulationandthefutureroleoftheICO.CHARLIEHARRY
SMITHCharlieisapoliticalphilosopheranddoctoralstudentattheOxfordInternetInstitute.Hisresearchconsidersthenormativeandtheoreticalissuessurroundingdigitalidentitysystems,withaparticularfocusoncontemporarygovernmentalpolicyinEnglandandWales.Charliealsoregularlyconsultsonglobalidentityprojects,andcurrentlyadvisestheOpenIdentityExchange,thetradebodyforUKdigitalidentitycompanies.4EXECUTIVESUMMARYInthispaper,
wearguethatthewidespreaduseofpersonalinformationonlinerepresentsafundamental?awinourdigitalinfrastructurethatenablesstaggeringlyhighlevelsoffraud,underminesourrighttoprivacy,
andlimitscompetition.Together,
thesetechnical,regulatory,
andinstitutionalinterventionsreimaginethefoundationsofamoderninternetbuiltonprivacy,
interoperability,andconsent.We
presentanalternativesystemwherestandardisedrequestsareinsteadroutedbyauser’s
device,withtheirconsent,betweencerti?edorganisations.Thisallowstheirpersonalinformationtobesubstitutedforsecurealternatives,likeuniqueidenti?ers,claims,andtokens.Forexample,anonlineretailercouldmakearequestfor‘payment’insteadofaskingacustomerfortheircarddetails.Theuser’s
devicewouldthenmatchthisrequesttotheorganisationsthatcouldrespondandpresenttheseoptionstotheminastandardisedconsentdialogue.Onceselected,thepaymentrequestwould
beforwardedbytheuser’s
devicetotheirbank,whichwouldresponddirectlytotheretailerwithaonetimepaymenttokenthatonlytheycoulduse.Theabilitytosecurelymoveinformationbetweentrustedorganisations—withuserconsent—wouldhaveaprofoundeffectonallaspectsoftheweb.Inparticular,
weexplorehowdigitalidentity,
onlinepayments,anddigitaladvertisingwouldbeaffected,anddescribethebene?tsofthissystemforbothusersandorganisations.Finallywearguethatthecommoncarrierlawsthatalreadyapplytointernetserviceprovidersshouldbeextendedtoourdevicesandtheroutingofstandardisedrequests.Thatanewnationalcerti?cationauthorityisneededtoestablishtrustandresolveliability,
andthatstandardsforrequestsandresponsesshouldbesetincooperationwithexistingstandardsbodiesandconsortia.5INTRODUCTIONTheweb’s
creatorsdidnotsetouttobuildthefoundationsofourtwenty-?rstcenturyeconomies.Theycouldneverhavepredictedthevolumeandvarietyofservicesthewebwouldonedayhandle.Whatstartedlifeasacommunicationstoolforacademicandmilitaryresearchersnowletsusdoalmostanything,fromshoppingforgroceriestoapplyingforamortgage.Butperformingthesetaskstodayinvolvestheuseoflargeamountsofpersonalinformation.We
areconstantlyexpectedtoacquire,remember,
andprovideinformationaboutandrelatingtoourselveswheninteractingwithorganisations;notjustusernamesandpasswords,butbankaccountnumbers,addresses,nationalinsurancenumbers,andevendoctors’lettersandutilitybills.homefromunderneathhim.Thenewowner,
whohadlegallyboughtthepropertyfromthemanhethoughtwasHall,wasnonethewiser.Althoughextreme,Hall’s
storyillustratesbothhowbrazenlyfraudstersarepro?tingfromthestatusquo,aswellasjusthowdramaticallytheuseofpersonalinformation—andparticularlyourcredentials—isfailingus.To
takeanotherexample,BritainwaslastyearcrownedthecardfraudcapitalofEurope,with84%ofattacksusingstolencarddetails
.3Yet
becausewereusethesamepaymentdetailseverywhereweshop,ifthesecredentialseverdogetintothewronghandswehavetothrowthemawayandstartagain,waitingforoursensitivebankingdetailstobepostedtousonanotherplasticcard.To
realiseaweb?tforthetwenty-?rstcentury,
weneedtofundamentallyrethinkthewaysinwhichweinteractwithorganisationsonline.We
mustlookbeyondthepersonalinformationthatfuelsfraudandaddsfriction,andchallengetheideathatweshouldbepersonallyresponsibleforremembering,managing,andrepeatedlyenteringallthisinformationourselves.Thewebhascatalysedhugelevelsofgrowthandinnovation,butourapproachtopersonalinformationhasbecomenotjustabottleneck,butaliability.Managingallthisinformationnowlimitseverythingfromouraccesstogovernmentservicestothehealthofourdemocracy.
Withsocialnetworksstrugglingtodistinguishhumansfrombots,badactorscanin?uencethepublicdiscourseonamassivescale.Atthesametime,safelymakingpayments,providingourdetails,andprovingwhoweareisbecomingever-more
challenging.And,againstthisbackground,theusabilityofthewebhassteadilydeclined.Inthispaper,
weproposeasetoftechnical,regulatory,
andinstitutionalinterventionsthatwouldrealiseawebbuiltnotonpersonalinformation,butontrustedconnections.Animportantinsightunderpinsthisproposal:iftherightorganisationscouldasktherightquestionsofoneanother,
thenourinformationcouldgetfromwhereitistowhereitneedstobewithoutushavingtoreaditout,writeitdown,ortypeitin.Thisability—toreliablyaskforandprovidedata—isthereforekeytomakingthewebfaster,
safer,
andmoreusable.Indeed,ourcontinuedrelianceonpersonalinformationisfuellingasecurityandprivacynightmare:asmanyas82%ofalldatabreachestodaystemfromthemisuseofcredentials
.
Behind1thescenes,companiesandgovernmentsarestrugglingtokeepup.Intheperpetualarmsracetoprotectourpersonalinformation,thecriminalsarewinning—astheReverendMikeHalldiscoveredin2021.Hallreturnedhomeafterafewweeksawayto?ndhisbelongingsgone,someoneelselivinginhishouse,andnewbuildingworkunderway
.
Itturned2outafraudsterhadusedafakedriver’s
licencetosetupabankaccountinHall’s
namebeforesellinghis123/business/resources/reports/dbir/2022/master-guide/https://www.bbc.co.uk/news/uk-england-essex-59069662https://www.smf.co.uk/uk-is-card-fraud-capital-of-europe-think-tank/6REPLACINGPERSONALD
ATAWITHTRUSTEDCONNECTONSToday,
ifacompanywantstocontactus,theyaskforouremailaddress.To
takepayment,theyaskforourcarddetails.And,tosignusin,theyaskforourusernameandpassword.Thesystemweproposeisradicallydifferent.Itwouldallowustodothesethings—andmanymore—bycreatingtrustedconnectionsbetweenexistingorganisations,withouthavingtoshareanypersonalinformation.withsomanypolicies,terms,andconditionsthatwecandolittlemorethanblindlyagree.Compoundingtheproblem,userinterfacesareoftendesignedtomaximiseclick-throughratestoservicetheinterestsoforganisationsratherthanusers.Insteadofgivingeachcompanylatitudetoaskfor‘consent’intheirownway,
onsitesandin-apps,thesamestandardisedscreenwouldbeusedacrossTake
onlinepaymentsasanexample.Insteadoftypingyourlongcardnumber,
expirydate,securitycode,fullname,andhomeaddressintoaretailerswebsite,arequestforpaymentwouldberouted,byyourdevice,toyourbank.Your
bankwouldthenbeabletoresponddirectlytotheretailerwithauniquepaymenttokenthatallowedthepaymenttobemade.Whilethisdescribesoneexample,thesamemodelwouldapplytoalmosteveryinteractionwehaveonline.FIGURE1DIAGRAMOFTHESYSTEMARCHITECTUREThiswouldallbeenabledbyyourdevice,whichwouldbuildupalistofwhohadwhat,functioningasaprivatedirectoryoftheorganisationsthatyouinteractwith.Whenanotherorganisationneededtoknowsomething,itwouldsimplyaskforitintheformofaspeci?crequest.Your
devicewouldthenroutetheserequeststotherelevantorganisations,whowouldeachresponddirectlywiththeappropriateinformation
.4Importantly,however,
noconnectionswouldeverbemadewithoutyourdevices?rstsecuringyourexplicitconsent.Meaningfulconsentiscurrentlyhardtocomebyontheweb.We
areregularlyfaced4Thisdescribeswhatwecalladynamicrequestasitcreatesadirectconnectionbetweentwoorganisations,butinsomecases,blindrequestscouldbemadethatwouldroutetheresponsebackthroughthedevice.Thiswouldallowustoshareinformationwithoutrevealingtheoriginoftherequest.7FIGURE2MOCKUPOFTHECONSENTINTERFACEdifferentdevicesandmanufacturers.Fromauser’sperspective,givingconsentwouldbetransformedintoaconsistentprocess.Theirdevicewouldclearlyshowthreethings:theorganisationmakingtherequests,thetypesofrequestsbeingmade,andthenamesoftheorganisationsorservicesintheuser’slifethatcouldrespond.Theywouldthenbeabletomakeaninformeddecisionandbetterunderstandwhohadtheirinformation.beset,butwewouldexpecttougherrequirementstobeputinplacefororganisationsrequestingorprovidingmoresensitiveinformation.Taking
outFIGURE3DIAGRAMOFTHEDEVICEQUERYINGTHERECORDOFCERTIFIEDORGANISATIONSThiswouldalwaysbeextremelystraightforwardforusers.Theywouldnothavetosetanythingup,andtheirdevicewouldneverredirectthemtoabrowserorauthenticator,askthemtoenteranypersonalinformation,oracceptextensivetermsandconditions.Ofcourse,wewouldwanttoknowthatthecompaniesaskingforourinformationhadsomelegitimacy;thattheywerenottryingtodefraudus,steal,orsellourinformation.Likewise,organisationsrequestinginformationwouldneedtoknowthatitwascomingfromalegitimatesource;thatitcouldbereliedupon,andwouldnotexposethemtounduerisk.Forthisreason,wearguethatarecognisedauthorityshouldbeestablishedtosetandcertifytherequirementsfordifferenttypesofrequestswithinthissystem.Forlow-riskinteractions,minimalrequirementswould8amortgage,forinstance,wouldrequirehigherlevelsofassurancethansubscribingtoastreamingservice.Thereisprecedenthere.Inmanysectors,likebankingandaviation,wealreadyexpectgovernmentstoguaranteealevelofprotectionbylicensingorcertifyingcompaniestoact.Itisnot,afterall,leftuptoconsumerstoaudittheliquidityofbanksorassessthesafetyofairlinesandwethinkthesamemodelshouldbeappliedtoourinformation.Whenthereareonlyafewinformationprovidersinanecosystem,thisisnotnecessarilyaproblem.Organisationsaregenerallyhappytospenddevelopmenttimeintegratingwitheachorganisationandaccepteachproviders’governancedemands.Butthisproprietaryapproachquicklybecomesunworkableatscale.Organisationsprovidingaccesstoinformationbecomeoverburdened,whilesmallerorganisationsareleftstructurallydisadvantaged.Theresultishugelydamagingforcompetitionandinnovation.Thebene?tsofensuringthatparticipatingorganisationswerecerti?edtohandleourinformationwouldbemanifold.Goingforwards,individualswouldknowthatanyinteractionshandledinthiswaywouldalwaysbecomingfromorgoingtotrustedorganisations.Thiswouldmassivelyreducetheriskofphishingattacks,scams,and?nancialfraud,removingtheburdenonuserstocheckasite’s
SSLcerti?cateorURL,andtherebymakingitfarmoredif?cultforthemtomistakenlygivetheirdetailsordatatomaliciousactors.Bycontrast,inthismodel,lotsofdifferentrequestscouldberoutedbetweenlotsofdifferentorganisations.Thewayinwhicheachorganisationaskedfororprovidedinformationwouldthereforeneedtobestandardised.Thiswouldensurethatallactorsinthesystemcouldseamlesslyinteroperatewithoneanother,
andiskeytorealisingthebene?tsofanopen,?exibleecosystembuiltonafoundationoftrustedconnectionsandcerti?edorganisations.Inmuchthesameway,
organisationswouldalsobeabletointeractwithgreatercon?dence,knowingtheycouldtrustthosethattheywereinteractingwith.Butcerti?cationwouldsaveparticipatingorganisationsaconsiderableamountoftimeandmoney,
too,astheywouldtakeonsigni?cantlylessliabilitywhensharingoraccessingdatafromcerti?edentities.Additionally,tobeginoperatingwithinthissystem,alltheseorganisationswouldneedtodoisbecomecerti?ed.Thislowbarriertoentry,
coupledwiththereductioninliability,
wouldthereforebeextremelyappealing.Ofcourse,inmanysectors,liketelecommunicationsandbanking,industryparticipantsalreadydevelopandmaintainstandardsviavariousinternationalorganisationsandconsortia.Standardssettingwouldaccordinglybelargelylefttotheseorganisations.Buttheoutputsofthesebodieswouldneedtobeconsolidatedintoauni?edrecord,publishedbyanewinternationalorganisation—astandardsforum,ratherthanastandard-settingbody.
We
believethatthisforumshouldalsoincludea‘layer’ofcivilsocietyorganisations,toadvocatefortherightsofcitizensandcounterbalanceindustryinterestsinthestandardisationprocess.Certi?cationwouldalsorealiseapowerfulgovernancemechanism,helpingensuresuf?cientoversightandaccountability.Eachcountry’scerti?cationauthoritywould,forinstance,beabletorevokecerti?cationiforganisationsmisbehaved.Wewouldalsoexpectregularauditingtoaccompanyhigherlevelsofassurance.Whilesimilarprocessestothesealreadyexistonpartsoftheweb,wethinksuchdecisionsshouldbehandledbypublicbodiesembeddedinthelegalandpoliticalframeworkofeachcountry—nottheprivatecompaniesthatcurrentlyprovideunaccountableaccreditationandcerti?cationfunctions.Settinguniversalstandardswouldusherinnumerousadvantages.Itwouldsavetime,reducecosts,andenableamuchhighervolumeofinteractionsto?owthroughthesystem,ensuringthatorganisationsknewwhatinformationtoexpectaswellashowtohandlerequestsandresponses.Integratingwithanypotentialorganisationwouldbecomefarmorestraightforward,openinguppossibilitiesforinnovativenewusecases.Thetransformationwouldbeanalogoustothatwhichrevolutionisedtherailways.Beforestandardisation,differentrailcompaniesuseddifferentgaugesoftrack.Mandatingastandardgaugeenabledthesetrackstointerconnectandkick-startedthetechnology’s
massiveexpansion.Forsimilarreasons,therewouldbeaclearincentivefororganisationstousetheagreeduponstandards.Followingthesestandardswouldbeaprerequisiteforcerti?cation,whichinturnwouldgrantThelastmajoraspectofthisproposalinvolvesstandardising
requests.To
facilitateeasyandsecureconnectionsbetweentrusted,certi?edorganisations,everyonewouldneedtospeakthesamelanguage.Atthemoment,anyorganisationlookingtointeroperatewithothersontheweb?rsthastoregisterandintegratewithseparatedataproviders,aseachmaintainstheirownbespokeapplicationorganisationsaccesstothissystem,thebene?tsofwhichwediscussinthefollowingchapter.programminginterfaces(APIs).55APIsfunctionsomewhatlikepipes,connectingsoftwareattwoorganisationstogetherthroughadatastream.9PRESERVINGPRIVACYRebuildingthewebonafoundationoftrustedconnectionswouldrealisenumerousadvantages.Notonlywouldtheimportantinteractionsinourlivesbecomemoresecure,easiertomake,andbasedonourexplicitconsent,butthisshiftwouldalsoopenupnewopportunitiesforinteractionsthatarenotpossibletoday.thisinformationgetsleaked,stolen,orsold,itcanthereforequicklybeputtowork(againstyou)inanothercontext,torealisefunctionsthatyoudidnotoriginallyintendandtowhichyoudidnotconsent.Inthisway,
dataaboutyouissomewhatanalogoustonuclearwaste
—valuableifitcanbeprocessedin6well-managed,high-securityfacilities,butdangerousifimproperlyhandledor,
worse,allowedtoleakoutintotheenvironment.Ourproposaltakesthisprovocationseriously,
addressingthetwinissuesofcontextandfunctionimprecisionbybuildinginhardlimitstotheconnectionswemake.Thisamountstoaradicalreimaginationoftheroleofpersonalinformationontheweb.Byensuringthatusersmustexplicitlyconsenttoanyconnection,andlockinginthesehardlimitsaspartofthestandardisationprocess,wereducetheradioactivity,ensuringthat,ifdatadoesleak,itcannotcausethewidespreaddamagethatpersonalinformationinvites.We
havealreadyseenhowmanagingpersonalinformationexposesustosigni?cantprivacyandsecurityrisks.Ifandwhenourinformationiscompromised,asinglebreachquicklybecomesacatastrophe,astheeffectsofthatbreachcascadethroughallthedifferentcontextsinwhichwehavepreviouslyandrepeatedlyenteredourdata.Thereuseofpersonalinformationthereforemagni?esthechancesof,andnegativeimpactsof,itsmisuse.Thisisbadenough.Butaswellasintroducingsuchstructuralweaknessestotheweb’s
foundations,expectingindividualstomanagetheirownpersonalinformationalsoallowsthemtobetrackedandpro?ledacrossthesevariouscontexts.To
understandhowthisproposalmovesustowardsamoreprivateandsecuresystem,basedonnotionsofcontextandfunctionspeci?city,
therearethreedifferenttechnicalelementsthateachprotectauser’sprivacyandkeeptheirdatasafe.Theseareuniqueidenti?ers,tokens,andclaims.Together,
thesethreeelementswouldallowustoachievemuchofthefunctionalityofthecurrentweb,simultaneouslyunlockingentirelynewpossibilities,whileeliminatingthemorassofunspeci?edpersonalinformationthatcurrentlylimitsouronlineinteractions.Infact,awholeindustryofadvertisersanddatabrokers,somemorelegitimatethanothers,currentlypro?tsfromtheprocessingofpersonaldata.Trackingourdigitalfootprints,thesecompaniesbuildupdetailedpro?lesofourinterests,whichtheythenresellorelsemonetise—underminingourprivacy.Whatisworse,successiveattemptstobringthesecompaniestoheelviadataprotectionregulationhasdonelittletocurbtheirappetiteforinformation,indicatingagainjusthowbrokenthesystemhasbecome.UNIQUEIDENTIFIERSWe
thinktherootcauseofalltheseissuesisalackofspeci?city.
Namely,
thepersonalinformationthatwecurrentlyreplicateandreuseallacrossthewebisneithercontextnorfunctionspeci?c.Your
emailaddress,forexample,canbeusedbyanyone,tosendyouanything,atanytime—anditisassociatedwithallofyouraccounts.OnceanyofTheuseofuniqueidenti?erswoulddramaticallychangethewaythatorganisationsassessedwhotheyweredealingwithinonlineinteractions.Currently,
organisationsstoreanemailaddressandpasswordwhenyou?rstsignup,thenaskyoutoprovidethisinformationagainwhenyounextinteractwiththem.Thisindicatesthatyouarelikelytobe6/sites/johnkoetsier/2022/08/06/data-is-the-nuclear-waste-of-the-information-age-on-big-tech-and-privacy/10thesameperson.But,asweknow,
emailsareeasilycopiedorstolen,andmanyusersdonotchoosesecurepasswords.Ouruseofpersonalinformationinthiswaythereforeallowsbadactorstocommitfraudbyposingassomeonetheyarenot.TOKENSAtokenwouldallowanorganisationtorequestsomeparticularaction,orrespondtosucharequest.Theserequestsandresponsescouldbeextremelyfunction-andcontext-speci?c.To
makeasign-inrequest,forinstance,aone-timetokenwouldbesentalongsideyouruniqueidenti?ertoinstructtheorganisationinquestiontologyouin.Or,
acontacttokencouldspecifythatonlythreemessagesmaybesenttotheemailassociatedwithaparticularuniqueidenti?erbeforethattokenexpired.Thisspeci?citywouldbeapowerfultoolforensuringthatwide-rangingprivilegeswerenevergrantedtoorganisations,atleastnotwithoutauser’s
explicitconsent.Theproblemisthattheseidenti?ersareuniversal—theyarethesameacrossthemanycontextsinwhichweusethem.Thisproposalwouldreplacetheseuniversalidenti?erswithcontext-speci?c,pseudonymousidenti?ers
.Eachoftheseidenti?ers7wouldbeone-of-a-kind,andonlyeverheldbytwoparties.So,everyorganisationinyourlifewoulduseadifferentrandomalphanumericstringtoidentifyyou,eitherviayourdeviceorelsewhencommunicatingwithotherorganisationsdirectly.Atthesametime,tokenswouldalsohelpTheseidenti?erswouldstillallowtrustedconnectionstobemade,buteverytimeadevicebrokeredanewrelationship—eitherbetweenitselfandanorganisation,orelsedirectlybetweentwoorganisations—anew,
randomidenti?erwouldbegenerated.Whenyou?rstmadeaconnection,theorganisationinvolvedwouldstorethisuniqueidenti?erinsteadofyouremailaddressandpassword.Whenyouinteractedagain,yourdevicewouldthenautomaticallyprovidethisuniqueidenti?ertoreliablyidentifyyou.Indeed,userswouldnotbeabletoseetheseidenti?erswhich,followingcybersecuritybestpractice,wouldconsistofstringsofrandomly-generatedlettersandnumbersthatwerealwaysencrypted.guaranteeahighlevelofsecurity.
Forinstance,ifanorganisationreceivedarequestwithouttheappropriatetoken,orifthetokendidnotcorrectlyreferencetheappropriateidenti?er,
thenthatorganisationwouldignoreit.Becausetokenswouldalsobeencrypted,onlyorganisationswiththerelevantkeycouldreadtheinstructionstheycontained.Thecontrastwiththestatusquo,wherepersonalinformationisduplicatedallovertheinternetandwecandolittlemorethanblindlytrustthatitwillnotbemisused,wouldbestark.CLAIMSRatherthanallowingsomethingtohappen,aclaimwouldsaysomethingaboutus.Theywouldusuallybesentasaresponsetoarequest,andcouldtaketheformofameasure,suchasapercentageornumber,
orsimplyayes/noanswer.
Claimscanthereforebefarmoreprivacypreservingthantheirpersonalinformationequivalents.Forexample,insteadofprovidingyourdriver’s
licencetoacarrentalcompany,
arequestforlicencecon?rmationcouldberoutedtothedrivingauthority.
Theauthoritycouldthensendbackanarrowresponse,specifyingthatyoucoulddrive,wereovertheageof25,andhadlessthanthreepoints.Inmanycases,asimple‘yes’or‘no’responsewouldsuf?ce.Intheeventofadatabreach,thescopefornegativerepercussionswouldthereforebeseverelylimited.Eachidenti?erwouldnotbearichformofpersonalinformation;itwouldcontainnosensitivedetailsaboutyou.And,behindthescenes,youwouldalwaysbeassociatedwithadifferentidenti?erineachorganisation’s
database.Thismeansthatthevariousentitiesinyourlifecouldnotbelinkedupbybadactors,eveniftheydidmanagetoacquiretheuniqueidenti?erassociatedwithyouraccountinoneparticularcontext.Uniqueidenti?ers,however,
areonlythe?rstpieceofthepuzzle.Inpractice,theywouldrarelybeexchangedontheirown,andwouldmostlybeaccompaniedbyanotherelementthatcontainedtherequestorresponsenecessaryforaninteractiontotakeplace.Thesecouldtaketheformofeithertokensorclaims,whichbothbuildonthecontext-speci?cityofuniqueidenti?erstodesignateaspeci?cfunctionortransferacertainpieceofinformation.Asthisshows,thebene?tofclaimsisthattheyalloworganisationstosaysomethingaboutyouwithoutrevealingsigni?cantamountsofpersonalinformation.Liketokens,theyarefunctionallyspeci?candconstrainedtoonecontext—theyrespondtoasinglerequestandnomoreand,astheyarealsosignedandencrypted,possessnovalueifintercepted.BLINDVS.DYNAMICR
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經權益所有人同意不得將文件中的內容挪作商業或盈利用途。
- 5. 人人文庫網僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
- 6. 下載文件中如有侵權或不適當內容,請與我們聯系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- T/CIMA 0030-2022單相智慧能源信息網關技術規范
- T/CHES 56-2021輸水工程沼蛤防治系統技術導則
- T/CHES 51-2021大中型泵站運行管理規程
- T/CHES 104-2023再生水利用量計算與評估技術規程
- T/CHATA 013-2021老年人肺結核篩查流程
- T/CGCC 47-2021數字消費券服務規范
- T/CECS 10363-2024薄壁不銹鋼管件用法蘭及法蘭接頭
- T/CECS 10300-2023鋼網格結構螺栓球節點用封板、錐頭和套筒
- T/CECS 10226-2022抗裂硅質防水劑
- T/CECS 10069-2019綠色建材評價軟化設備
- 借款分期付款協議書
- 2025屆陜西省高三新高考全真模擬政治試題(原卷版+解析版)
- 南京2025年南京市市場監督管理局所屬事業單位招聘編外筆試歷年參考題庫附帶答案詳解
- GB/T 30819-2024機器人用諧波齒輪減速器
- DL-T5394-2021電力工程地下金屬構筑物防腐技術導則
- 浙江省溫州市2022年初中科學中考試題及參考答案
- 食品經營操作流程圖
- 排樁+錨索深基坑安全專項施工方案
- 大型橋梁高程控制網的布設和精度分析
- 普拉提運動對大學生圓肩駝背體態矯正的研究
- 成本管理畢業論文參考文獻大全范文
評論
0/150
提交評論