![德莫斯研究所-重塑網絡:個人數(shù)據(jù)的未來(英)_第1頁](http://file4.renrendoc.com/view/2553014e16392ef0b7af8684b7828ea5/2553014e16392ef0b7af8684b7828ea51.gif)
![德莫斯研究所-重塑網絡:個人數(shù)據(jù)的未來(英)_第2頁](http://file4.renrendoc.com/view/2553014e16392ef0b7af8684b7828ea5/2553014e16392ef0b7af8684b7828ea52.gif)
![德莫斯研究所-重塑網絡:個人數(shù)據(jù)的未來(英)_第3頁](http://file4.renrendoc.com/view/2553014e16392ef0b7af8684b7828ea5/2553014e16392ef0b7af8684b7828ea53.gif)
![德莫斯研究所-重塑網絡:個人數(shù)據(jù)的未來(英)_第4頁](http://file4.renrendoc.com/view/2553014e16392ef0b7af8684b7828ea5/2553014e16392ef0b7af8684b7828ea54.gif)
![德莫斯研究所-重塑網絡:個人數(shù)據(jù)的未來(英)_第5頁](http://file4.renrendoc.com/view/2553014e16392ef0b7af8684b7828ea5/2553014e16392ef0b7af8684b7828ea55.gif)
版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領
文檔簡介
REWIRINGTHEWEBTHEFUTUREOFPERSONALD
ATAJONNASHCHARLIEHARRYSMITHJUNE2023OpenAccess.Somerightsreserved.OpenAccess.Somerightsreserved.Asthepublisherofthiswork,Demoswantstoencouragethecirculationofourworkaswidelyaspossiblewhileretainingthecopyright.We
thereforehaveanopenaccesspolicywhichenablesanyonetoaccessourcontentonlinewithoutcharge.Anyonecandownload,save,performordistributethisworkinanyformat,includingtranslation,withoutwrittenpermission.ThisissubjecttothetermsoftheCreativeCommonsByShareAlikelicence.Themainconditionsare:?
Demosandtheauthor(s)arecreditedincludingourwebaddresswww.demos.co.uk?
Ifyouuseourwork,yousharetheresultsunderasimilarlicenceAfullcopyofthelicencecanbefoundat/licenses/by-sa/3.0/legalcodeYou
arewelcometoaskforpermissiontousethisworkforpurposesotherthanthosecoveredbythelicence.DemosgratefullyacknowledgestheworkofCreativeCommonsininspiringourapproachtocopyright.To
?ndoutmoregotoPublishedbyDemosJune2023?Demos.Somerightsreserved.15Whitehall,London,SW1A2DDT:
02038783955hello@demos.co.ukwww.demos.co.uk2C
NTENTSACKNOWLEDGEMENTSPAGE
4PAGE
5PAGE
6PAGE
7PAGE
10PAGE
14PAGE
17PAGE
20EXECUTIVESUMMARYINTRODUCTIONREPLACINGPERSONALD
ATA
WITHTRUSTEDCONNECTIONSPRESERVINGPRIVACYENSURINGINTEROPERABILITYREQUIRINGMEANINGFULCONSENTCONCLUSION3ACKNOWLEDGEMENTSWe
wouldliketothankanumberofpeoplefortheirinputandfeedbackonthedraftofthispaper.
Theseinclude:KeeganMcBride,VickyNash,RogerTaylor,
JohnTaysom,
KirstyInnes,To
mWestgarth,LeoRinger,
AndrewBennett,SimonWorthington,MarkBembridge,AreeqChowdhury,JuneBrawner,
ElliotJones,ValentinaPavel,WillHayter,
BluebellDrummond,VincenzoRampulla,CaseyCalista,SamuelRowe,BryanGlick,DaveBirch,andIanBrown.AtDemos,wewouldliketoacknowledgetheassistanceofPollyCurtis,EllenJudson,andOliverMarshthroughouttheproject.ABOUTTHISPROVOCATION
PAPERThispaperproposesaseriesoftechnical,regulatory,
andinstitutionalinterventionsthatreimaginethefoundationsofamoderninternetbuiltonprivacy,
interoperability,andconsent.JonNashCharlieHarrySmithJune2023JONNASHJonisapoliticalscientistandentrepreneur.
Heco-foundedMainstream,alivevideostreamingplatform,withformerFacebookandABCexecutives,andwentontobuildapopularlocationbasedmessagingservice.HisresearchfocusesontechnologypolicyanddemocraticinnovationandhehasadvisedthegovermentonreplacingGeneralDataProtectionRegulationandthefutureroleoftheICO.CHARLIEHARRY
SMITHCharlieisapoliticalphilosopheranddoctoralstudentattheOxfordInternetInstitute.Hisresearchconsidersthenormativeandtheoreticalissuessurroundingdigitalidentitysystems,withaparticularfocusoncontemporarygovernmentalpolicyinEnglandandWales.Charliealsoregularlyconsultsonglobalidentityprojects,andcurrentlyadvisestheOpenIdentityExchange,thetradebodyforUKdigitalidentitycompanies.4EXECUTIVESUMMARYInthispaper,
wearguethatthewidespreaduseofpersonalinformationonlinerepresentsafundamental?awinourdigitalinfrastructurethatenablesstaggeringlyhighlevelsoffraud,underminesourrighttoprivacy,
andlimitscompetition.Together,
thesetechnical,regulatory,
andinstitutionalinterventionsreimaginethefoundationsofamoderninternetbuiltonprivacy,
interoperability,andconsent.We
presentanalternativesystemwherestandardisedrequestsareinsteadroutedbyauser’s
device,withtheirconsent,betweencerti?edorganisations.Thisallowstheirpersonalinformationtobesubstitutedforsecurealternatives,likeuniqueidenti?ers,claims,andtokens.Forexample,anonlineretailercouldmakearequestfor‘payment’insteadofaskingacustomerfortheircarddetails.Theuser’s
devicewouldthenmatchthisrequesttotheorganisationsthatcouldrespondandpresenttheseoptionstotheminastandardisedconsentdialogue.Onceselected,thepaymentrequestwould
beforwardedbytheuser’s
devicetotheirbank,whichwouldresponddirectlytotheretailerwithaonetimepaymenttokenthatonlytheycoulduse.Theabilitytosecurelymoveinformationbetweentrustedorganisations—withuserconsent—wouldhaveaprofoundeffectonallaspectsoftheweb.Inparticular,
weexplorehowdigitalidentity,
onlinepayments,anddigitaladvertisingwouldbeaffected,anddescribethebene?tsofthissystemforbothusersandorganisations.Finallywearguethatthecommoncarrierlawsthatalreadyapplytointernetserviceprovidersshouldbeextendedtoourdevicesandtheroutingofstandardisedrequests.Thatanewnationalcerti?cationauthorityisneededtoestablishtrustandresolveliability,
andthatstandardsforrequestsandresponsesshouldbesetincooperationwithexistingstandardsbodiesandconsortia.5INTRODUCTIONTheweb’s
creatorsdidnotsetouttobuildthefoundationsofourtwenty-?rstcenturyeconomies.Theycouldneverhavepredictedthevolumeandvarietyofservicesthewebwouldonedayhandle.Whatstartedlifeasacommunicationstoolforacademicandmilitaryresearchersnowletsusdoalmostanything,fromshoppingforgroceriestoapplyingforamortgage.Butperformingthesetaskstodayinvolvestheuseoflargeamountsofpersonalinformation.We
areconstantlyexpectedtoacquire,remember,
andprovideinformationaboutandrelatingtoourselveswheninteractingwithorganisations;notjustusernamesandpasswords,butbankaccountnumbers,addresses,nationalinsurancenumbers,andevendoctors’lettersandutilitybills.homefromunderneathhim.Thenewowner,
whohadlegallyboughtthepropertyfromthemanhethoughtwasHall,wasnonethewiser.Althoughextreme,Hall’s
storyillustratesbothhowbrazenlyfraudstersarepro?tingfromthestatusquo,aswellasjusthowdramaticallytheuseofpersonalinformation—andparticularlyourcredentials—isfailingus.To
takeanotherexample,BritainwaslastyearcrownedthecardfraudcapitalofEurope,with84%ofattacksusingstolencarddetails
.3Yet
becausewereusethesamepaymentdetailseverywhereweshop,ifthesecredentialseverdogetintothewronghandswehavetothrowthemawayandstartagain,waitingforoursensitivebankingdetailstobepostedtousonanotherplasticcard.To
realiseaweb?tforthetwenty-?rstcentury,
weneedtofundamentallyrethinkthewaysinwhichweinteractwithorganisationsonline.We
mustlookbeyondthepersonalinformationthatfuelsfraudandaddsfriction,andchallengetheideathatweshouldbepersonallyresponsibleforremembering,managing,andrepeatedlyenteringallthisinformationourselves.Thewebhascatalysedhugelevelsofgrowthandinnovation,butourapproachtopersonalinformationhasbecomenotjustabottleneck,butaliability.Managingallthisinformationnowlimitseverythingfromouraccesstogovernmentservicestothehealthofourdemocracy.
Withsocialnetworksstrugglingtodistinguishhumansfrombots,badactorscanin?uencethepublicdiscourseonamassivescale.Atthesametime,safelymakingpayments,providingourdetails,andprovingwhoweareisbecomingever-more
challenging.And,againstthisbackground,theusabilityofthewebhassteadilydeclined.Inthispaper,
weproposeasetoftechnical,regulatory,
andinstitutionalinterventionsthatwouldrealiseawebbuiltnotonpersonalinformation,butontrustedconnections.Animportantinsightunderpinsthisproposal:iftherightorganisationscouldasktherightquestionsofoneanother,
thenourinformationcouldgetfromwhereitistowhereitneedstobewithoutushavingtoreaditout,writeitdown,ortypeitin.Thisability—toreliablyaskforandprovidedata—isthereforekeytomakingthewebfaster,
safer,
andmoreusable.Indeed,ourcontinuedrelianceonpersonalinformationisfuellingasecurityandprivacynightmare:asmanyas82%ofalldatabreachestodaystemfromthemisuseofcredentials
.
Behind1thescenes,companiesandgovernmentsarestrugglingtokeepup.Intheperpetualarmsracetoprotectourpersonalinformation,thecriminalsarewinning—astheReverendMikeHalldiscoveredin2021.Hallreturnedhomeafterafewweeksawayto?ndhisbelongingsgone,someoneelselivinginhishouse,andnewbuildingworkunderway
.
Itturned2outafraudsterhadusedafakedriver’s
licencetosetupabankaccountinHall’s
namebeforesellinghis123/business/resources/reports/dbir/2022/master-guide/https://www.bbc.co.uk/news/uk-england-essex-59069662https://www.smf.co.uk/uk-is-card-fraud-capital-of-europe-think-tank/6REPLACINGPERSONALD
ATAWITHTRUSTEDCONNECTONSToday,
ifacompanywantstocontactus,theyaskforouremailaddress.To
takepayment,theyaskforourcarddetails.And,tosignusin,theyaskforourusernameandpassword.Thesystemweproposeisradicallydifferent.Itwouldallowustodothesethings—andmanymore—bycreatingtrustedconnectionsbetweenexistingorganisations,withouthavingtoshareanypersonalinformation.withsomanypolicies,terms,andconditionsthatwecandolittlemorethanblindlyagree.Compoundingtheproblem,userinterfacesareoftendesignedtomaximiseclick-throughratestoservicetheinterestsoforganisationsratherthanusers.Insteadofgivingeachcompanylatitudetoaskfor‘consent’intheirownway,
onsitesandin-apps,thesamestandardisedscreenwouldbeusedacrossTake
onlinepaymentsasanexample.Insteadoftypingyourlongcardnumber,
expirydate,securitycode,fullname,andhomeaddressintoaretailerswebsite,arequestforpaymentwouldberouted,byyourdevice,toyourbank.Your
bankwouldthenbeabletoresponddirectlytotheretailerwithauniquepaymenttokenthatallowedthepaymenttobemade.Whilethisdescribesoneexample,thesamemodelwouldapplytoalmosteveryinteractionwehaveonline.FIGURE1DIAGRAMOFTHESYSTEMARCHITECTUREThiswouldallbeenabledbyyourdevice,whichwouldbuildupalistofwhohadwhat,functioningasaprivatedirectoryoftheorganisationsthatyouinteractwith.Whenanotherorganisationneededtoknowsomething,itwouldsimplyaskforitintheformofaspeci?crequest.Your
devicewouldthenroutetheserequeststotherelevantorganisations,whowouldeachresponddirectlywiththeappropriateinformation
.4Importantly,however,
noconnectionswouldeverbemadewithoutyourdevices?rstsecuringyourexplicitconsent.Meaningfulconsentiscurrentlyhardtocomebyontheweb.We
areregularlyfaced4Thisdescribeswhatwecalladynamicrequestasitcreatesadirectconnectionbetweentwoorganisations,butinsomecases,blindrequestscouldbemadethatwouldroutetheresponsebackthroughthedevice.Thiswouldallowustoshareinformationwithoutrevealingtheoriginoftherequest.7FIGURE2MOCKUPOFTHECONSENTINTERFACEdifferentdevicesandmanufacturers.Fromauser’sperspective,givingconsentwouldbetransformedintoaconsistentprocess.Theirdevicewouldclearlyshowthreethings:theorganisationmakingtherequests,thetypesofrequestsbeingmade,andthenamesoftheorganisationsorservicesintheuser’slifethatcouldrespond.Theywouldthenbeabletomakeaninformeddecisionandbetterunderstandwhohadtheirinformation.beset,butwewouldexpecttougherrequirementstobeputinplacefororganisationsrequestingorprovidingmoresensitiveinformation.Taking
outFIGURE3DIAGRAMOFTHEDEVICEQUERYINGTHERECORDOFCERTIFIEDORGANISATIONSThiswouldalwaysbeextremelystraightforwardforusers.Theywouldnothavetosetanythingup,andtheirdevicewouldneverredirectthemtoabrowserorauthenticator,askthemtoenteranypersonalinformation,oracceptextensivetermsandconditions.Ofcourse,wewouldwanttoknowthatthecompaniesaskingforourinformationhadsomelegitimacy;thattheywerenottryingtodefraudus,steal,orsellourinformation.Likewise,organisationsrequestinginformationwouldneedtoknowthatitwascomingfromalegitimatesource;thatitcouldbereliedupon,andwouldnotexposethemtounduerisk.Forthisreason,wearguethatarecognisedauthorityshouldbeestablishedtosetandcertifytherequirementsfordifferenttypesofrequestswithinthissystem.Forlow-riskinteractions,minimalrequirementswould8amortgage,forinstance,wouldrequirehigherlevelsofassurancethansubscribingtoastreamingservice.Thereisprecedenthere.Inmanysectors,likebankingandaviation,wealreadyexpectgovernmentstoguaranteealevelofprotectionbylicensingorcertifyingcompaniestoact.Itisnot,afterall,leftuptoconsumerstoaudittheliquidityofbanksorassessthesafetyofairlinesandwethinkthesamemodelshouldbeappliedtoourinformation.Whenthereareonlyafewinformationprovidersinanecosystem,thisisnotnecessarilyaproblem.Organisationsaregenerallyhappytospenddevelopmenttimeintegratingwitheachorganisationandaccepteachproviders’governancedemands.Butthisproprietaryapproachquicklybecomesunworkableatscale.Organisationsprovidingaccesstoinformationbecomeoverburdened,whilesmallerorganisationsareleftstructurallydisadvantaged.Theresultishugelydamagingforcompetitionandinnovation.Thebene?tsofensuringthatparticipatingorganisationswerecerti?edtohandleourinformationwouldbemanifold.Goingforwards,individualswouldknowthatanyinteractionshandledinthiswaywouldalwaysbecomingfromorgoingtotrustedorganisations.Thiswouldmassivelyreducetheriskofphishingattacks,scams,and?nancialfraud,removingtheburdenonuserstocheckasite’s
SSLcerti?cateorURL,andtherebymakingitfarmoredif?cultforthemtomistakenlygivetheirdetailsordatatomaliciousactors.Bycontrast,inthismodel,lotsofdifferentrequestscouldberoutedbetweenlotsofdifferentorganisations.Thewayinwhicheachorganisationaskedfororprovidedinformationwouldthereforeneedtobestandardised.Thiswouldensurethatallactorsinthesystemcouldseamlesslyinteroperatewithoneanother,
andiskeytorealisingthebene?tsofanopen,?exibleecosystembuiltonafoundationoftrustedconnectionsandcerti?edorganisations.Inmuchthesameway,
organisationswouldalsobeabletointeractwithgreatercon?dence,knowingtheycouldtrustthosethattheywereinteractingwith.Butcerti?cationwouldsaveparticipatingorganisationsaconsiderableamountoftimeandmoney,
too,astheywouldtakeonsigni?cantlylessliabilitywhensharingoraccessingdatafromcerti?edentities.Additionally,tobeginoperatingwithinthissystem,alltheseorganisationswouldneedtodoisbecomecerti?ed.Thislowbarriertoentry,
coupledwiththereductioninliability,
wouldthereforebeextremelyappealing.Ofcourse,inmanysectors,liketelecommunicationsandbanking,industryparticipantsalreadydevelopandmaintainstandardsviavariousinternationalorganisationsandconsortia.Standardssettingwouldaccordinglybelargelylefttotheseorganisations.Buttheoutputsofthesebodieswouldneedtobeconsolidatedintoauni?edrecord,publishedbyanewinternationalorganisation—astandardsforum,ratherthanastandard-settingbody.
We
believethatthisforumshouldalsoincludea‘layer’ofcivilsocietyorganisations,toadvocatefortherightsofcitizensandcounterbalanceindustryinterestsinthestandardisationprocess.Certi?cationwouldalsorealiseapowerfulgovernancemechanism,helpingensuresuf?cientoversightandaccountability.Eachcountry’scerti?cationauthoritywould,forinstance,beabletorevokecerti?cationiforganisationsmisbehaved.Wewouldalsoexpectregularauditingtoaccompanyhigherlevelsofassurance.Whilesimilarprocessestothesealreadyexistonpartsoftheweb,wethinksuchdecisionsshouldbehandledbypublicbodiesembeddedinthelegalandpoliticalframeworkofeachcountry—nottheprivatecompaniesthatcurrentlyprovideunaccountableaccreditationandcerti?cationfunctions.Settinguniversalstandardswouldusherinnumerousadvantages.Itwouldsavetime,reducecosts,andenableamuchhighervolumeofinteractionsto?owthroughthesystem,ensuringthatorganisationsknewwhatinformationtoexpectaswellashowtohandlerequestsandresponses.Integratingwithanypotentialorganisationwouldbecomefarmorestraightforward,openinguppossibilitiesforinnovativenewusecases.Thetransformationwouldbeanalogoustothatwhichrevolutionisedtherailways.Beforestandardisation,differentrailcompaniesuseddifferentgaugesoftrack.Mandatingastandardgaugeenabledthesetrackstointerconnectandkick-startedthetechnology’s
massiveexpansion.Forsimilarreasons,therewouldbeaclearincentivefororganisationstousetheagreeduponstandards.Followingthesestandardswouldbeaprerequisiteforcerti?cation,whichinturnwouldgrantThelastmajoraspectofthisproposalinvolvesstandardising
requests.To
facilitateeasyandsecureconnectionsbetweentrusted,certi?edorganisations,everyonewouldneedtospeakthesamelanguage.Atthemoment,anyorganisationlookingtointeroperatewithothersontheweb?rsthastoregisterandintegratewithseparatedataproviders,aseachmaintainstheirownbespokeapplicationorganisationsaccesstothissystem,thebene?tsofwhichwediscussinthefollowingchapter.programminginterfaces(APIs).55APIsfunctionsomewhatlikepipes,connectingsoftwareattwoorganisationstogetherthroughadatastream.9PRESERVINGPRIVACYRebuildingthewebonafoundationoftrustedconnectionswouldrealisenumerousadvantages.Notonlywouldtheimportantinteractionsinourlivesbecomemoresecure,easiertomake,andbasedonourexplicitconsent,butthisshiftwouldalsoopenupnewopportunitiesforinteractionsthatarenotpossibletoday.thisinformationgetsleaked,stolen,orsold,itcanthereforequicklybeputtowork(againstyou)inanothercontext,torealisefunctionsthatyoudidnotoriginallyintendandtowhichyoudidnotconsent.Inthisway,
dataaboutyouissomewhatanalogoustonuclearwaste
—valuableifitcanbeprocessedin6well-managed,high-securityfacilities,butdangerousifimproperlyhandledor,
worse,allowedtoleakoutintotheenvironment.Ourproposaltakesthisprovocationseriously,
addressingthetwinissuesofcontextandfunctionimprecisionbybuildinginhardlimitstotheconnectionswemake.Thisamountstoaradicalreimaginationoftheroleofpersonalinformationontheweb.Byensuringthatusersmustexplicitlyconsenttoanyconnection,andlockinginthesehardlimitsaspartofthestandardisationprocess,wereducetheradioactivity,ensuringthat,ifdatadoesleak,itcannotcausethewidespreaddamagethatpersonalinformationinvites.We
havealreadyseenhowmanagingpersonalinformationexposesustosigni?cantprivacyandsecurityrisks.Ifandwhenourinformationiscompromised,asinglebreachquicklybecomesacatastrophe,astheeffectsofthatbreachcascadethroughallthedifferentcontextsinwhichwehavepreviouslyandrepeatedlyenteredourdata.Thereuseofpersonalinformationthereforemagni?esthechancesof,andnegativeimpactsof,itsmisuse.Thisisbadenough.Butaswellasintroducingsuchstructuralweaknessestotheweb’s
foundations,expectingindividualstomanagetheirownpersonalinformationalsoallowsthemtobetrackedandpro?ledacrossthesevariouscontexts.To
understandhowthisproposalmovesustowardsamoreprivateandsecuresystem,basedonnotionsofcontextandfunctionspeci?city,
therearethreedifferenttechnicalelementsthateachprotectauser’sprivacyandkeeptheirdatasafe.Theseareuniqueidenti?ers,tokens,andclaims.Together,
thesethreeelementswouldallowustoachievemuchofthefunctionalityofthecurrentweb,simultaneouslyunlockingentirelynewpossibilities,whileeliminatingthemorassofunspeci?edpersonalinformationthatcurrentlylimitsouronlineinteractions.Infact,awholeindustryofadvertisersanddatabrokers,somemorelegitimatethanothers,currentlypro?tsfromtheprocessingofpersonaldata.Trackingourdigitalfootprints,thesecompaniesbuildupdetailedpro?lesofourinterests,whichtheythenresellorelsemonetise—underminingourprivacy.Whatisworse,successiveattemptstobringthesecompaniestoheelviadataprotectionregulationhasdonelittletocurbtheirappetiteforinformation,indicatingagainjusthowbrokenthesystemhasbecome.UNIQUEIDENTIFIERSWe
thinktherootcauseofalltheseissuesisalackofspeci?city.
Namely,
thepersonalinformationthatwecurrentlyreplicateandreuseallacrossthewebisneithercontextnorfunctionspeci?c.Your
emailaddress,forexample,canbeusedbyanyone,tosendyouanything,atanytime—anditisassociatedwithallofyouraccounts.OnceanyofTheuseofuniqueidenti?erswoulddramaticallychangethewaythatorganisationsassessedwhotheyweredealingwithinonlineinteractions.Currently,
organisationsstoreanemailaddressandpasswordwhenyou?rstsignup,thenaskyoutoprovidethisinformationagainwhenyounextinteractwiththem.Thisindicatesthatyouarelikelytobe6/sites/johnkoetsier/2022/08/06/data-is-the-nuclear-waste-of-the-information-age-on-big-tech-and-privacy/10thesameperson.But,asweknow,
emailsareeasilycopiedorstolen,andmanyusersdonotchoosesecurepasswords.Ouruseofpersonalinformationinthiswaythereforeallowsbadactorstocommitfraudbyposingassomeonetheyarenot.TOKENSAtokenwouldallowanorganisationtorequestsomeparticularaction,orrespondtosucharequest.Theserequestsandresponsescouldbeextremelyfunction-andcontext-speci?c.To
makeasign-inrequest,forinstance,aone-timetokenwouldbesentalongsideyouruniqueidenti?ertoinstructtheorganisationinquestiontologyouin.Or,
acontacttokencouldspecifythatonlythreemessagesmaybesenttotheemailassociatedwithaparticularuniqueidenti?erbeforethattokenexpired.Thisspeci?citywouldbeapowerfultoolforensuringthatwide-rangingprivilegeswerenevergrantedtoorganisations,atleastnotwithoutauser’s
explicitconsent.Theproblemisthattheseidenti?ersareuniversal—theyarethesameacrossthemanycontextsinwhichweusethem.Thisproposalwouldreplacetheseuniversalidenti?erswithcontext-speci?c,pseudonymousidenti?ers
.Eachoftheseidenti?ers7wouldbeone-of-a-kind,andonlyeverheldbytwoparties.So,everyorganisationinyourlifewoulduseadifferentrandomalphanumericstringtoidentifyyou,eitherviayourdeviceorelsewhencommunicatingwithotherorganisationsdirectly.Atthesametime,tokenswouldalsohelpTheseidenti?erswouldstillallowtrustedconnectionstobemade,buteverytimeadevicebrokeredanewrelationship—eitherbetweenitselfandanorganisation,orelsedirectlybetweentwoorganisations—anew,
randomidenti?erwouldbegenerated.Whenyou?rstmadeaconnection,theorganisationinvolvedwouldstorethisuniqueidenti?erinsteadofyouremailaddressandpassword.Whenyouinteractedagain,yourdevicewouldthenautomaticallyprovidethisuniqueidenti?ertoreliablyidentifyyou.Indeed,userswouldnotbeabletoseetheseidenti?erswhich,followingcybersecuritybestpractice,wouldconsistofstringsofrandomly-generatedlettersandnumbersthatwerealwaysencrypted.guaranteeahighlevelofsecurity.
Forinstance,ifanorganisationreceivedarequestwithouttheappropriatetoken,orifthetokendidnotcorrectlyreferencetheappropriateidenti?er,
thenthatorganisationwouldignoreit.Becausetokenswouldalsobeencrypted,onlyorganisationswiththerelevantkeycouldreadtheinstructionstheycontained.Thecontrastwiththestatusquo,wherepersonalinformationisduplicatedallovertheinternetandwecandolittlemorethanblindlytrustthatitwillnotbemisused,wouldbestark.CLAIMSRatherthanallowingsomethingtohappen,aclaimwouldsaysomethingaboutus.Theywouldusuallybesentasaresponsetoarequest,andcouldtaketheformofameasure,suchasapercentageornumber,
orsimplyayes/noanswer.
Claimscanthereforebefarmoreprivacypreservingthantheirpersonalinformationequivalents.Forexample,insteadofprovidingyourdriver’s
licencetoacarrentalcompany,
arequestforlicencecon?rmationcouldberoutedtothedrivingauthority.
Theauthoritycouldthensendbackanarrowresponse,specifyingthatyoucoulddrive,wereovertheageof25,andhadlessthanthreepoints.Inmanycases,asimple‘yes’or‘no’responsewouldsuf?ce.Intheeventofadatabreach,thescopefornegativerepercussionswouldthereforebeseverelylimited.Eachidenti?erwouldnotbearichformofpersonalinformation;itwouldcontainnosensitivedetailsaboutyou.And,behindthescenes,youwouldalwaysbeassociatedwithadifferentidenti?erineachorganisation’s
database.Thismeansthatthevariousentitiesinyourlifecouldnotbelinkedupbybadactors,eveniftheydidmanagetoacquiretheuniqueidenti?erassociatedwithyouraccountinoneparticularcontext.Uniqueidenti?ers,however,
areonlythe?rstpieceofthepuzzle.Inpractice,theywouldrarelybeexchangedontheirown,andwouldmostlybeaccompaniedbyanotherelementthatcontainedtherequestorresponsenecessaryforaninteractiontotakeplace.Thesecouldtaketheformofeithertokensorclaims,whichbothbuildonthecontext-speci?cityofuniqueidenti?erstodesignateaspeci?cfunctionortransferacertainpieceofinformation.Asthisshows,thebene?tofclaimsisthattheyalloworganisationstosaysomethingaboutyouwithoutrevealingsigni?cantamountsofpersonalinformation.Liketokens,theyarefunctionallyspeci?candconstrainedtoonecontext—theyrespondtoasinglerequestandnomoreand,astheyarealsosignedandencrypted,possessnovalueifintercepted.BLINDVS.DYNAMICR
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經權益所有人同意不得將文件中的內容挪作商業(yè)或盈利用途。
- 5. 人人文庫網僅提供信息存儲空間,僅對用戶上傳內容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
- 6. 下載文件中如有侵權或不適當內容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 人教部編版歷史九年級下冊:第11課 《蘇聯(lián)的社會主義建設》 聽課評課記錄
- 《溝通中外文明的“絲綢之路”》名師聽課評課記錄(新部編人教版七年級上冊歷史)
- 生物醫(yī)藥產業(yè)園監(jiān)理合同(2篇)
- 電力價格調整合同(2篇)
- 五年級上冊數(shù)學聽評課記錄《7.1 誰先走》(3)-北師大版
- 部編人教版歷史九年級上冊第15課《探尋新航路》聽課評課記錄
- 湘教版數(shù)學八年級上冊《小結練習》聽評課記錄5
- 人教版數(shù)學七年級上冊3.2《解一元一次方程(一)-合并同類項與移項》聽評課記錄1
- 五年級上冊數(shù)學聽評課記錄-總復習2-北師大版
- 新版湘教版秋八年級數(shù)學上冊第二章三角形課題三角形的內角和定理聽評課記錄
- 必修3《政治與法治》 選擇題專練50題 含解析-備戰(zhàn)2025年高考政治考試易錯題(新高考專用)
- 二零二五版電商企業(yè)兼職財務顧問雇用協(xié)議3篇
- 課題申報參考:流視角下社區(qū)生活圈的適老化評價與空間優(yōu)化研究-以沈陽市為例
- 《openEuler操作系統(tǒng)》考試復習題庫(含答案)
- 2024-2025學年人教版生物八年級上冊期末綜合測試卷
- 創(chuàng)傷急救-止血、包扎課件
- 大數(shù)據(jù)背景下網絡輿情成因及治理
- 道教系統(tǒng)諸神仙位寶誥全譜
- 中國經濟轉型導論-政府與市場的關系課件
- 新視野大學英語讀寫教程 第三版 Book 2 unit 8 教案 講稿
- 村務公開表格
評論
0/150
提交評論