diff --git a/index.html b/index.html index 9469825..9147ed6 100644 --- a/index.html +++ b/index.html @@ -1,7 +1,7 @@ - Controllable Identifier Document 1.0 + Controlled Identifier Document 1.0

@@ -1936,7 +1936,7 @@

Capability Invocation

The `capabilityInvocation` [=verification relationship=] is used to specify a [=verification method=] that might be used by the [=controller=] to invoke a cryptographic capability, such as the -authorization to update the [=controllable identifier document=]. +authorization to update the [=controlled identifier document=].

@@ -1962,7 +1962,7 @@

Capability Invocation

The server providing the HTTP API is the verifier of the capability and it would need to verify that the [=verification method=] referred to by the invoked capability exists in the `capabilityInvocation` -property of the [=controllable identifier document=]. The verifier would also check to make sure +property of the [=controlled identifier document=]. The verifier would also check to make sure that the action being performed is valid and the capability is appropriate for the resource being accessed. If the verification is successful, the server has cryptographically determined that the invoker is authorized to access the @@ -2548,7 +2548,7 @@

Retrieve Verification Method

of the URL scheme and using the supplied options.
  • -If controllerDocument is not a [=conforming controllable identifier document=], +If controllerDocument is not a [=conforming controlled identifier document=], an error MUST be raised and SHOULD convey an error type of INVALID_CONTROLLER_DOCUMENT. @@ -2597,11 +2597,11 @@

    Retrieve Verification Method

    The following example provides a minimum conformant -[=controllable identifier document=] containing a minimum conformant +[=controlled identifier document=] containing a minimum conformant [=verification method=] as required by the algorithm in this section:

    -
    +        
     {
       "id": "https://controller.example/123",
       "verificationMethod": [{
    @@ -2614,23 +2614,23 @@ 

    Retrieve Verification Method

    }
    -

    +

    [=Verification method identifiers=] are expressed as strings that are URLs, or -via the `id` property, whose value is a URL. It is possible for a [=controllable identifier +via the `id` property, whose value is a URL. It is possible for a [=controlled identifier document=] to express a [=verification method=], through a [=verification -relationship=], that exists in a place that is external to the [=controllable identifier +relationship=], that exists in a place that is external to the [=controlled identifier document=]. As described in Section [[[#integrity-protection-of-controllers]]], -specifying a [=verification method=] that is external to a [=controllable identifier +specifying a [=verification method=] that is external to a [=controlled identifier document=] is a valid use of this specification. It is vital that this -[=verification method=] is retrieved from the external [=controllable identifier document=]. +[=verification method=] is retrieved from the external [=controlled identifier document=].

    When retrieving any [=verification method=] the algorithm above is used to ensure that the [=verification method=] is retrieved from the correct -[=controllable identifier document=]. The algorithm also ensures that this [=controllable identifier +[=controlled identifier document=]. The algorithm also ensures that this [=controlled identifier document=] refers to the [=verification method=] (via a [=verification -relationship=]) and that the [=verification method=] refers to the [=controllable identifier +relationship=]) and that the [=verification method=] refers to the [=controlled identifier document=] (via the [=verification method=]'s `controller` property). Failure to use this algorithm, or an equivalent one that performs these checks, can lead to security compromises where an attacker poisons a cache by claiming control of a @@ -2648,7 +2648,7 @@

    Retrieve Verification Method

    In the example above, the algorithm described in this section will use the `https://external.example/xyz#key-789` URL value as the [=verification method identifier=]. The algorithm will then confirm that the [=verification method=] -exists in the external [=controllable identifier document=] and that the appropriate +exists in the external [=controlled identifier document=] and that the appropriate relationships exist as described earlier in this section.

    @@ -2697,22 +2697,22 @@

    Processing Errors

    INVALID_CONTROLLER_DOCUMENT_ID (-22)
    -The `id` value in a [=controllable identifier document=] was malformed. See Section +The `id` value in a [=controlled identifier document=] was malformed. See Section [[[#retrieve-verification-method]]].
    INVALID_CONTROLLER_DOCUMENT (-23)
    -The [=controllable identifier document=] was malformed. See Section +The [=controlled identifier document=] was malformed. See Section [[[#retrieve-verification-method]]].
    INVALID_VERIFICATION_METHOD (-24)
    -The [=verification method=] in a [=controllable identifier document=] was malformed. See Section +The [=verification method=] in a [=controlled identifier document=] was malformed. See Section [[[#retrieve-verification-method]]].
    INVALID_RELATIONSHIP_FOR_VERIFICATION_METHOD (-25)
    -The [=verification method=] in a [=controllable identifier document=] was not +The [=verification method=] in a [=controlled identifier document=] was not associated using the expected [=verification relationship=] as expressed in the `proofPurpose` property in the [=proof=]. See Section [[[#retrieve-verification-method]]]. @@ -2857,7 +2857,7 @@

    Context Injection

    -When an application is processing a [=controllable identifier document=], if an `@context` +When an application is processing a [=controlled identifier document=], if an `@context` property is not provided in the document or the terms used in the document are not mapped by existing values in the `@context` property, implementations MUST inject or append an `@context` property with a value of @@ -2866,7 +2866,7 @@

    Context Injection

    (`https://www.w3.org/ns/did/v1`).

    -
    +          
     {
       "id": "https://controller.example/101",
       "verificationMethod": [{
    @@ -2972,10 +2972,10 @@ 

    Proving Control and Binding

    Binding an entity in the digital world or the physical world to an identifier, to -a [=controllable identifier document=], or to cryptographic material requires the use of +a [=controlled identifier document=], or to cryptographic material requires the use of security protocols contemplated by this specification. The following sections describe some possible scenarios and how an entity therein might prove control -over an identifier or a [=controllable identifier document=] for the purposes of authentication or +over an identifier or a [=controlled identifier document=] for the purposes of authentication or authorization.

    @@ -2983,9 +2983,9 @@

    Proving Control and Binding

    Proving Control of an Identifier and/or Controller Document

    -Proving control over an identifier and/or a [=controllable identifier document=] is useful +Proving control over an identifier and/or a [=controlled identifier document=] is useful when accessing remote systems. Cryptographic digital signatures enable certain -security protocols related to [=controllable identifier documents=] +security protocols related to [=controlled identifier documents=] to be cryptographically verifiable. For these purposes, this specification defines useful [=verification relationships=] in and [[[#capability-invocation]]]. The @@ -2999,10 +2999,10 @@

    Proving Control of an Identifier and/or Controller Document

    Binding to Physical Identity

    -An identifier or [=controllable identifier document=] do not inherently carry any +An identifier or [=controlled identifier document=] do not inherently carry any personal data and it is strongly advised that non-public entities do not publish personal data in -[=controllable identifier documents=]. +[=controlled identifier documents=].

    @@ -3141,7 +3141,7 @@

    Verification Method Rotation

    Rotation is a management process that enables the secret cryptographic material associated with an existing [=verification method=] to be deactivated or destroyed once a new [=verification method=] has been added to the -[=controllable identifier document=]. Going forward, any new [=proofs=] that a +[=controlled identifier document=]. Going forward, any new [=proofs=] that a [=controller=] would have generated using the old secret cryptographic material can now instead be generated using the new cryptographic material and can be verified using the new [=verification method=]. @@ -3175,7 +3175,7 @@

    Verification Method Rotation

  • [=Verification method=] rotation manifests only as changes to the current or -latest version of a [=controllable identifier document=]. +latest version of a [=controlled identifier document=].
  • When a [=verification method=] has been active for a long time, or used for @@ -3187,7 +3187,7 @@

    Verification Method Rotation

  • Proofs or signatures that rely on [=verification methods=] that are not -present in the latest version of a [=controllable identifier document=] are not impacted by +present in the latest version of a [=controlled identifier document=] are not impacted by rotation. In these cases, verification software might require additional information, such as when a particular [=verification method=] was expected to be valid as well as access to a verifiable data registry @@ -3221,7 +3221,7 @@

    Verification Method Revocation

    Compromise of the secrets associated with a [=verification method=] allows the attacker to use them according to the [=verification relationship=] -expressed by [=controller=] in the [=controllable identifier document=], for example, for +expressed by [=controller=] in the [=controlled identifier document=], for example, for authentication. The attacker's use of the secrets might be indistinguishable from the legitimate [=controller=]'s use starting from the time the [=verification method=] was registered, to the time it was @@ -3250,7 +3250,7 @@

    Verification Method Revocation

  • [=Verification method=] revocation can only be embodied in changes to -the latest version of a [=controllable identifier document=]; it cannot retroactively adjust +the latest version of a [=controlled identifier document=]; it cannot retroactively adjust previous versions.
  • @@ -3272,7 +3272,7 @@

    Verification Method Revocation

  • -Even if a [=verification method=] is present in a [=controllable identifier document=], +Even if a [=verification method=] is present in a [=controlled identifier document=], additional information, such as a public key revocation certificate, or an external allow or deny list, could be used to determine whether a [=verification method=] has been revoked. @@ -3294,7 +3294,7 @@

    Revocation Semantics

    revoked verification method, knowing whether a verification was made with a revoked [=verification method=] is trickier than it might seem. Some auditing systems provide the ability to look back at the state of an identifier at a -point in time, or at a particular version of the [=controllable identifier document=]. +point in time, or at a particular version of the [=controlled identifier document=]. When such a feature is combined with a reliable way to determine the time or identifier version that existed when a cryptographically verifiable statement was made, then revocation does not undo that statement. This can be the basis @@ -3307,7 +3307,7 @@

    Revocation Semantics

    However, in order for such semantics to be safe, the second condition — an -ability to know what the state of the [=controllable identifier document=] was at the time +ability to know what the state of the [=controlled identifier document=] was at the time the assertion was made — is expected to apply. Without that guarantee, someone could discover a revoked key and use it to make cryptographically verifiable statements with a simulated date in the past. @@ -3361,17 +3361,17 @@

    Encrypted Data in Controller Documents

    Encryption algorithms have been known to fail due to advances in cryptography and computing power. Implementers are advised to assume that any encrypted data -placed in a [=controllable identifier document=] might eventually be made available in clear text +placed in a [=controlled identifier document=] might eventually be made available in clear text to the same audience to which the encrypted data is available. This is -particularly pertinent if the [=controllable identifier document=] is public. +particularly pertinent if the [=controlled identifier document=] is public.

    -Encrypting all or parts of a [=controllable identifier document=] is not an appropriate +Encrypting all or parts of a [=controlled identifier document=] is not an appropriate means to protect data in the long term. Similarly, placing encrypted data in -a [=controllable identifier document=] is not an appropriate means to protect personal data. +a [=controlled identifier document=] is not an appropriate means to protect personal data.

    -Given the caveats above, if encrypted data is included in a [=controllable identifier document=], +Given the caveats above, if encrypted data is included in a [=controlled identifier document=], implementers are advised to not associate any correlatable information that could be used to infer a relationship between the encrypted data and an associated party. Examples of correlatable information include @@ -3385,19 +3385,19 @@

    Encrypted Data in Controller Documents

    Content Integrity Protection

    -[=Controllable identifier documents=] that include links to external machine-readable +[=Controlled identifier documents=] that include links to external machine-readable content such as images, web pages, or schemas are vulnerable to tampering. It is strongly advised that external links are integrity protected using mechanisms to secure related resources such as those described in the [[[?VC-DATA-MODEL-2.0]]] specification. External links are to be avoided if they cannot be integrity -protected and the [=controllable identifier document=]'s integrity is dependent on the +protected and the [=controlled identifier document=]'s integrity is dependent on the external link.

    -One example of an external link where the integrity of the [=controllable identifier +One example of an external link where the integrity of the [=controlled identifier document=] itself could be affected is the JSON-LD Context [[JSON-LD11]], when present. To protect against compromise, -[=controllable identifier document=] consumers using JSON-LD are advised to cache +[=controlled identifier document=] consumers using JSON-LD are advised to cache local static copies of JSON-LD contexts and/or verify the integrity of external contexts against a cryptographic hash that is known to be associated with a safe version of the external JSON-LD Context. @@ -3409,8 +3409,8 @@

    Integrity Protection of Controllers

    As described in Section [[[#controllers]]], this specification includes a -mechanism by which to delegate change control of a [=controllable identifier document=] to -an entity that is described in an external [=controllable identifier document=] through the +mechanism by which to delegate change control of a [=controlled identifier document=] to +an entity that is described in an external [=controlled identifier document=] through the use of the `controller` property.

    @@ -3421,7 +3421,7 @@

    Integrity Protection of Controllers

    provide account recovery services, among other use cases. In such scenarios, it can be beneficial to allow the guardian to manage the rotation of their own key material. It can also be beneficial for the delegator to associate -a cryptographic hash of the remote [=controllable identifier document=] to "pin" the +a cryptographic hash of the remote [=controlled identifier document=] to "pin" the remote document to a known good value.

    @@ -3474,10 +3474,10 @@

    Level of Assurance

    assertion and [=authentication=] might be used in some of these situations, information about the applied security context might need to be expressed and provided to a verifier. Whether and how -to encode this information in the [=controllable identifier document=] data model is out +to encode this information in the [=controlled identifier document=] data model is out of scope for this specification. Interested readers might note that 1) the information could be transmitted using Verifiable Credentials -[[?VC-DATA-MODEL-2.0]], and 2) the [=controllable identifier document=] data model can be +[[?VC-DATA-MODEL-2.0]], and 2) the [=controlled identifier document=] data model can be extended to incorporate this information.

    @@ -3486,7 +3486,7 @@

    Level of Assurance

    Service Endpoints for Authentication and Authorization

    -If a [=controllable identifier document=] publishes a [=service=] intended for authentication +If a [=controlled identifier document=] publishes a [=service=] intended for authentication or authorization of the [=subject=] (see Section [[[#services]]]), it is the responsibility of the [=service=] provider, [=subject=], and/or requesting party to comply with the requirements of the authentication and/or authorization @@ -3500,16 +3500,16 @@

    Service Endpoints for Authentication and Authorization

    Privacy Considerations

    -Since [=controllable identifier documents=] are designed to be administered directly by +Since [=controlled identifier documents=] are designed to be administered directly by the [=controller=], it is critically important to apply the principles of Privacy by Design [[PRIVACY-BY-DESIGN]] to all aspects of the -[=controllable identifier document=]. All seven of these principles have been applied +[=controlled identifier document=]. All seven of these principles have been applied throughout the development of this specification. The design used in this specification does not assume that there is a registrar, hosting company, nor other intermediate service provider to recommend or apply additional privacy safeguards. Privacy in this specification is preventive, not remedial, and is an embedded default. The following sections cover privacy considerations that -implementers might find useful when building systems that utilize [=controllable identifier +implementers might find useful when building systems that utilize [=controlled identifier documents=].

    @@ -3517,13 +3517,13 @@

    Privacy Considerations

    Keep Personal Data Private

    -If a [=controllable identifier document=] is about a specific individual and is -public-facing, it is critical that [=controllable identifier documents=] contain +If a [=controlled identifier document=] is about a specific individual and is +public-facing, it is critical that [=controlled identifier documents=] contain no personal biometric or biographical data. While it is true that personal data might include pseudonymous information, such as a public cryptographic key or an IP address, publishing that sort of information does not create the same immediate privacy dangers as publishing an individual's full name, profile photo, or social media -account in a [=controllable identifier document=]. A better alternative is to transmit +account in a [=controlled identifier document=]. A better alternative is to transmit such personal data through other means such as verifiable credentials [[?VC-DATA-MODEL-2.0]] or other data formats sent over private and secure communication channels. @@ -3553,7 +3553,7 @@

    Relationship to the Same-Origin Policy

    (tracking). Those that use this specification are warned that there are trade-offs with each approach and to use the mechanism that maximizes security and privacy according to the needs of the individual or organization. Using a -[=controllable identifier document=] for all use cases is not always advantageous when a +[=controlled identifier document=] for all use cases is not always advantageous when a same-origin bound cryptographic key would suffice.

    @@ -3579,10 +3579,10 @@

    Controller Document Correlation Risks

    The anti-correlation protections of [=pairwise identifiers=] are easily defeated -if the data in the corresponding [=controllable identifier documents=] can be correlated. For -example, using identical [=verification methods=] in multiple [=controllable identifier +if the data in the corresponding [=controlled identifier documents=] can be correlated. For +example, using identical [=verification methods=] in multiple [=controlled identifier documents=] can provide as much correlation information as using the same -identifier. Therefore, the [=controllable identifier document=] for a [=pairwise identifier=] +identifier. Therefore, the [=controlled identifier document=] for a [=pairwise identifier=] also needs to use pairwise unique information, such as ensuring that [=verification methods=] are unique to the pairwise relationship.

    @@ -3592,7 +3592,7 @@

    Controller Document Correlation Risks

    Subject Classification

    -It is dangerous to add properties to the [=controllable identifier document=] that can be +It is dangerous to add properties to the [=controlled identifier document=] that can be used to indicate, explicitly or through inference, what type or nature of thing the [=subject=] is, particularly if the [=subject=] is a person.

    @@ -3601,19 +3601,19 @@

    Subject Classification

    [[[#keep-personal-data-private]]]) or correlatable data (see and [[[#controller-document-correlation-risks]]]) being present in -the [=controllable identifier document=], but they can be used for grouping particular +the [=controlled identifier document=], but they can be used for grouping particular identifiers in such a way that they are included in or excluded from certain operations or functionalities.

    -Including type information in a [=controllable identifier document=] can result +Including type information in a [=controlled identifier document=] can result in personal privacy harms even for [=subjects=] that are non-person entities, such as IoT devices. The aggregation of such information around a [=controller=] could serve as a form of digital fingerprint and this is best avoided.

    -To minimize these risks, all properties in a [=controllable identifier document=] ought to +To minimize these risks, all properties in a [=controlled identifier document=] ought to be for expressing [=verification methods=] and verification relationships related to using the identifier.

    @@ -3623,22 +3623,22 @@

    Subject Classification

    Service Privacy

    -The ability for a [=controller=] to optionally express at least one [=service=] in the [=controllable identifier document=] increases their control and agency. -Each additional endpoint in the [=controllable identifier document=] adds privacy risk either +The ability for a [=controller=] to optionally express at least one [=service=] in the [=controlled identifier document=] increases their control and agency. +Each additional endpoint in the [=controlled identifier document=] adds privacy risk either due to correlation, such as across endpoint descriptions, or because the [=services=] are not protected by an authorization mechanism, or both.

    -[=Controllable identifier documents=] are often public and, since they are standardized, will +[=Controlled identifier documents=] are often public and, since they are standardized, will be stored and indexed efficiently. This -risk is increased if [=controllable identifier documents=] are published to immutable -[=verifiable data registries=]. Access to a history of the [=controllable identifier +risk is increased if [=controlled identifier documents=] are published to immutable +[=verifiable data registries=]. Access to a history of the [=controlled identifier documents=] referenced by a URL enables a form of traffic analysis made more efficient through the use of standards.

    The degree of additional privacy risk caused by including multiple [=services=] in -one [=controllable identifier document=] can be difficult to estimate. Privacy harms are +one [=controlled identifier document=] can be difficult to estimate. Privacy harms are typically unintended consequences. URLs can refer to documents, [=services=], schemas, and other things that might be associated with individual people, households, clubs, and employers — and correlation of their [=services=] @@ -3706,7 +3706,7 @@

    IANA Considerations

    application/cid

    This specification registers the `application/cid` media type specifically for -identifying documents conforming to the [=controllable identifier document=] +identifying documents conforming to the [=controlled identifier document=] format.

    @@ -3806,7 +3806,7 @@

    Multikey Examples

    +               title="Multiple public keys encoded as Multikeys in a controlled identifier document">
     {
       "@context": "https://www.w3.org/ns/controller/v1",
       "id": "https://controller.example/123",
    @@ -3912,7 +3912,7 @@ 

    JsonWebKey Examples

    +               title="Multiple public keys encoded as JsonWebKey in a controlled identifier document">
     {
       "@context": "https://www.w3.org/ns/controller/v1",
       "id": "https://controller.example/123",
    diff --git a/transitions/2025/CR1/index.html b/transitions/2025/CR1/index.html
    index 313c125..f2f4fcd 100644
    --- a/transitions/2025/CR1/index.html
    +++ b/transitions/2025/CR1/index.html
    @@ -43,7 +43,7 @@
     .dfn-panel.docked{position:fixed;left:.5em;top:unset;bottom:2em;margin:0 auto;max-width:calc(100vw - .75em * 2 - .5em - .2em * 2);max-height:30vh;overflow:auto}
     
         
    -Controllable Identifier Document 1.0
    +Controlled Identifier Document 1.0
         
         
         
    @@ -143,7 +143,7 @@
     
     
     
    -
     
    @@ -478,7 +478,7 @@
     

    -

    Controllable Identifier Document 1.0

    +

    Controlled Identifier Document 1.0

    W3C Candidate Recommendation Snapshot

    More details about this document @@ -554,7 +554,7 @@

    Controllable Identifier Document 1.0

    Abstract

    -A controllable identifier document contains cryptographic material and lists service +A controlled identifier document contains cryptographic material and lists service endpoints for the purposes of verifying cryptographic proofs from, and interacting with, the controller of an identifier.

    @@ -621,24 +621,24 @@

    Controllable Identifier Document 1.0

    -Controllable identifier documents identify a subject and provide verification methods that express public cryptographic material, such as public keys, +Controlled identifier documents identify a subject and provide verification methods that express public cryptographic material, such as public keys, for verifying proofs created on behalf of the subject for specific purposes, such as authentication, attestation, key agreement (for encryption), -and capability invocation and delegation. Controllable identifier documents also list +and capability invocation and delegation. Controlled identifier documents also list service endpoints related to an identifier; for example, from which to request additional information for verification.

    -In other words, the controllable identifier document contains the information necessary to +In other words, the controlled identifier document contains the information necessary to communicate with, and/or prove that specific actions were taken by, the controller of an identifier, including material for proofs and service endpoints for additional communications.

    -A controllable identifier document specifies +A controlled identifier document specifies verification relationships and service endpoints for a single -identifier, for which the current controllable identifier document is taken as authoritative. +identifier, for which the current controlled identifier document is taken as authoritative.

    It is expected that other specifications will profile @@ -654,8 +654,8 @@

    Controllable Identifier Document 1.0

    citing it directly received objections. This issue notes that the WG intends to resolve the text below into something that we can achieve consensus on:

    For example, the Decentralized Identifiers Specification is expected to -define DID documents as a profile of controllable identifier documents, where the DID is the -identifier, DID documents are controllable identifier documents, and resolution is the +define DID documents as a profile of controlled identifier documents, where the DID is the +identifier, DID documents are controlled identifier documents, and resolution is the process of retrieving the canonical DID document for a DID.

    @@ -812,7 +812,7 @@

    Controllable Identifier Document 1.0

    when, and only when, they appear in all capitals, as shown here.

    -A conforming controllable identifier document is any concrete expression of the +A conforming controlled identifier document is any concrete expression of the data model that follows the relevant normative requirements in Sections 2. Data Model and 4. Contexts and Vocabularies.

    @@ -826,7 +826,7 @@

    Controllable Identifier Document 1.0

    A conforming document is either a -conforming controllable identifier document, or a +conforming controlled identifier document, or a conforming verification method.

    @@ -860,15 +860,15 @@

    Controllable Identifier Document 1.0

    perform a specific activity. -
    controllable identifier
    -
    +
    controlled identifier
    +

    A type of identifier that can be proven to be under the control of an entity.

    -
    controllable identifier document
    -
    +
    controlled identifier document
    +

    A document that contains cryptographic material and lists service endpoints that can be used for verifying proofs from, and interacting with, the @@ -880,7 +880,7 @@

    Controllable Identifier Document 1.0

    An entity that is capable of performing an action with a specific resource, such -as updating a controllable identifier document or generating a proof using a +as updating a controlled identifier document or generating a proof using a verification method.

    @@ -919,7 +919,7 @@

    Controllable Identifier Document 1.0

    An entity, such as a person, group, organization, physical thing, digital thing, or logical thing that is referred to by the value of an id property in a -controllable identifier document. Subjects identified in a controllable identifier document +controlled identifier document. Subjects identified in a controlled identifier document are also used as a subjects in other contexts, such as during authentication or in verifiable credentials.

    @@ -951,9 +951,9 @@

    Controllable Identifier Document 1.0

    -A controllable identifier document specifies one or more relationships between +A controlled identifier document specifies one or more relationships between an identifier and a set of verification methods and/or service -endpoints. The controllable identifier document SHOULD +endpoints. The controlled identifier document SHOULD contain verification relationships that explicitly permit the use of certain verification methods for specific purposes.

    @@ -1005,7 +1005,7 @@

    Controllable Identifier Document 1.0

    -The following sections define the properties in a controllable identifier document, +The following sections define the properties in a controlled identifier document, including whether these properties are required or optional. These properties describe relationships between the subject and the value of the property. @@ -1131,7 +1131,7 @@

    Controllable Identifier Document 1.0

    2.1.1 Subjects

    -A subject is expressed using the id property in a controllable identifier document. +A subject is expressed using the id property in a controlled identifier document. The value of an id property is referred to as an identifier.

    @@ -1144,7 +1144,7 @@

    Controllable Identifier Document 1.0

    -A controllable identifier document MUST contain an id value in the topmost +A controlled identifier document MUST contain an id value in the topmost map.

    @@ -1158,20 +1158,20 @@

    Controllable Identifier Document 1.0

    The value of the id property in the topmost -map of the controllable identifier document is -called the base identifier for the controllable identifier document. The URL -for retrieving the current, authoritative controllable identifier document for a given -identifier is called the canonical URL for the controllable identifier document. Dereferencing the canonical URL MUST return the current -authoritative controllable identifier document. The returned document's base identifier MUST be the same as the canonical URL; if it is anything else, -then the returned document is not an authoritative controllable identifier document and -the identifier SHOULD be treated as invalid. Every controllable identifier document is +map of the controlled identifier document is +called the base identifier for the controlled identifier document. The URL +for retrieving the current, authoritative controlled identifier document for a given +identifier is called the canonical URL for the controlled identifier document. Dereferencing the canonical URL MUST return the current +authoritative controlled identifier document. The returned document's base identifier MUST be the same as the canonical URL; if it is anything else, +then the returned document is not an authoritative controlled identifier document and +the identifier SHOULD be treated as invalid. Every controlled identifier document is stored and retrieved according to the canonical URL of the document, which MUST also be the base identifier of the document.

    Note: Identifiers are context-dependent

    -It is expected that the subject referred to by an id in a controllable identifier document will be consistent over time, such that any verifiable credentials that use them can be interpreted as referring to the same entity. +It is expected that the subject referred to by an id in a controlled identifier document will be consistent over time, such that any verifiable credentials that use them can be interpreted as referring to the same entity. For example, it is preferred that an issuer of a verifiable credential require that a subject demonstrate proof of control over their identifier before issuing a credential with that identifier as @@ -1194,21 +1194,21 @@

    Controllable Identifier Document 1.0

    -A controller of a controllable identifier document is any entity capable of making changes to that -controllable identifier document. Whoever can update +A controller of a controlled identifier document is any entity capable of making changes to that +controlled identifier document. Whoever can update the content of the resource returned from dereferencing the controller document's canonical URL is, by definition, a controller of the document and its canonical identifier. Proofs that satisfy a -controllable identifier document's verification methods are taken as cryptographic +controlled identifier document's verification methods are taken as cryptographic assurance that the controller of the identifier created those proofs.

    Note: Identifier Controller versus Document Controller

    -The controller of the controllable identifier document is taken to be the +The controller of the controlled identifier document is taken to be the controller of the document's canonical identifier, also known as its -URL. That is, whoever can update the controllable identifier document is both +URL. That is, whoever can update the controlled identifier document is both the document controller and the identifier controller. Updating the document is how you control the identifier. These terms can be used -interchangeably. Controlling the canonical controllable identifier document for +interchangeably. Controlling the canonical controlled identifier document for an identifier is the same as controlling the identifier.

    @@ -1221,12 +1221,12 @@

    Controllable Identifier Document 1.0

    Note: Presumed Control

    It is possible to list a verification method which is functionally under the control of someone other than the controller -of the controllable identifier document. For example, a document controller could +of the controlled identifier document. For example, a document controller could set a public key under another party's control as an authentication verification method. This would enable the other party to authenticate on behalf of this identifier (because their public key is listed in an authentication verification method) without enabling that party -to update the controllable identifier document. However, since the document +to update the controlled identifier document. However, since the document controller explicitly listed that key for authentication, the proof in question is taken as created by the document controller, as it was created by their explicit assignee. This is especially useful @@ -1246,8 +1246,8 @@

    Controllable Identifier Document 1.0

    Each entry in the controller property MUST identify an entity capable of updating the canonical version -of the controllable identifier document. -Subsequent requests for this controllable identifier document through its +of the controlled identifier document. +Subsequent requests for this controlled identifier document through its canonical location will always receive the latest version.

    @@ -1256,9 +1256,9 @@

    Controllable Identifier Document 1.0

    -
    +
    - Example 4: Controllable identifier document with a controller property + Example 4: Controlled identifier document with a controller property
    {
       "@context": "https://www.w3.org/ns/controller/v1",
       "id": "https://controller1.example/123",
    @@ -1322,8 +1322,8 @@ 

    Controllable Identifier Document 1.0

    Applications might choose to consider two identifiers related by alsoKnownAs to be equivalent if the alsoKnownAs relationship expressed in the -controllable identifier document of one subject is also expressed in the reverse direction -(i.e., reciprocated) in the controllable identifier document of the other subject. It is +controlled identifier document of one subject is also expressed in the reverse direction +(i.e., reciprocated) in the controlled identifier document of the other subject. It is best practice not to consider them equivalent in the absence of this reciprocating relationship. In other words, the presence of an alsoKnownAs assertion does not prove that this assertion @@ -1334,7 +1334,7 @@

    Controllable Identifier Document 1.0

    Given that the subject might use different identifiers for different purposes, such as enhanced privacy protection, an expectation of strong equivalence between the two identifiers, or taking action to -merge the information from the two corresponding controllable identifier documents, is +merge the information from the two corresponding controlled identifier documents, is not necessarily appropriate, even with a reciprocal relationship.

    @@ -1345,7 +1345,7 @@

    Controllable Identifier Document 1.0

    -Services are used in controllable identifier documents to express ways of +Services are used in controlled identifier documents to express ways of communicating with the controller, or associated entities, in relation to the controlled identifier. A service can be any type of service the controller wants to advertise for further discovery, @@ -1432,7 +1432,7 @@

    Controllable Identifier Document 1.0

    2.2 Verification Methods

    -A controllable identifier document can express verification methods, such as +A controlled identifier document can express verification methods, such as cryptographic public keys, which can be used to verify proofs, such as those used to authenticate or authorize interactions with the controller or associated parties. For example, a cryptographic public key can be used as a verification method with respect to a digital @@ -1452,7 +1452,7 @@

    Controllable Identifier Document 1.0

    -A verification method is defined in a controllable identifier document using the +A verification method is defined in a controlled identifier document using the map below and is referred to as the verification method definition:

    @@ -1539,7 +1539,7 @@

    Controllable Identifier Document 1.0

    Note: The `controller` property is used by multiple objects

    -The controller property is used by controllable identifier documents, as described in +The controller property is used by controlled identifier documents, as described in Section 2.1 Controller Documents, and by verification methods, as described in Section 2.2 Verification Methods. When it is used in either place, its purpose is essentially the same; that is, it expresses one or more @@ -1547,7 +1547,7 @@

    Controllable Identifier Document 1.0

    resource with which it is associated.

    -In the case of the controller of a controllable identifier document, the +In the case of the controller of a controlled identifier document, the controller can update the content of the document. In the case of the controller of a verification method, the controller can generate proofs that satisfy the method. @@ -1555,9 +1555,9 @@

    Controllable Identifier Document 1.0

    To ensure explicit security guarantees, the controller of a verification method cannot be inferred from the -controllable identifier document. It is necessary to explicitly express the identifier of +controlled identifier document. It is necessary to explicitly express the identifier of the controller of the key because the value of controller for a verification method is not necessarily the value of the controller for a -controllable identifier document. +controlled identifier document.

    2.2.1 Verification Material

    @@ -1580,7 +1580,7 @@

    Controllable Identifier Document 1.0

    To increase the likelihood of interoperable implementations, this specification limits the number of formats for expressing verification material in a -controllable identifier document. The fewer formats that implementers have to +controlled identifier document. The fewer formats that implementers have to choose from, the more likely that interoperability will be achieved. This approach attempts to strike a delicate balance between easing implementation and providing support for formats that have historically had broad deployment. @@ -1600,7 +1600,7 @@

    Controllable Identifier Document 1.0

    -An example of a controllable identifier document containing verification +An example of a controlled identifier document containing verification methods using both properties above is shown below.

    @@ -1793,7 +1793,7 @@

    Controllable Identifier Document 1.0

    key. Implementations that adhere to this specification will raise errors in the event of a Multikey header value that is not in the public key header table above, or when reading a Multikey value that is expected to be a public key, -such as one published in a controllable identifier document, that does not start with a known +such as one published in a controlled identifier document, that does not start with a known public key header.

    @@ -1945,7 +1945,7 @@

    Controllable Identifier Document 1.0

    embedded and its properties can be accessed directly. However, if the value is a URL string, the verification method has been included by reference and its properties will need to be retrieved from -elsewhere in the controllable identifier document or from another controllable identifier document. This +elsewhere in the controlled identifier document or from another controlled identifier document. This is done by dereferencing the URL and searching the resulting resource for a verification method map with an id property whose value matches the URL. @@ -1988,11 +1988,11 @@

    Controllable Identifier Document 1.0

    Different verification relationships enable the associated verification methods to be used for different purposes. It is up to a verifier to ascertain the validity of a verification attempt by checking that the -verification method used is referred to by the appropriate verification relationship property in the controllable identifier document. +verification method used is referred to by the appropriate verification relationship property in the controlled identifier document.

    -The verification relationship between the subject and the verification method is explicit in the controllable identifier document. Verification methods +The verification relationship between the subject and the verification method is explicit in the controlled identifier document. Verification methods that are not associated with a particular verification relationship cannot be used for that verification relationship. For example, a verification method associated with the authentication property cannot be used to engage in key agreement protocols — the value of the @@ -2002,12 +2002,12 @@

    Controllable Identifier Document 1.0

    If a referenced verification method definition is not in the latest -controllable identifier document used to dereference it, then that verification method is considered invalid or revoked. +controlled identifier document used to dereference it, then that verification method is considered invalid or revoked.

    The following sections define several useful verification relationships. A -controllable identifier document MAY include any of these, or other properties, to +controlled identifier document MAY include any of these, or other properties, to express a specific verification relationship. To maximize interoperability, any such properties used SHOULD be registered in the list of DID Document Property Extensions. @@ -2076,13 +2076,13 @@

    Controllable Identifier Document 1.0

    for the purpose of "authentication", and that says that an entity is identified by the id, then that verifier checks to ensure that the proof can be verified using a verification method (for example, public key) listed -under authentication in the controllable identifier document. +under authentication in the controlled identifier document.

    Note that the verification method indicated by the -authentication property of a controllable identifier document can +authentication property of a controlled identifier document can only be used to authenticate on behalf -of the controllable identifier document's base identifier. +of the controlled identifier document's base identifier.

    @@ -2206,7 +2206,7 @@

    Controllable Identifier Document 1.0

    The capabilityInvocation verification relationship is used to specify a verification method that might be used by the controller to invoke a cryptographic capability, such as the -authorization to update the controllable identifier document. +authorization to update the controlled identifier document.

    @@ -2232,7 +2232,7 @@

    Controllable Identifier Document 1.0

    The server providing the HTTP API is the verifier of the capability and it would need to verify that the verification method referred to by the invoked capability exists in the capabilityInvocation -property of the controllable identifier document. The verifier would also check to make sure +property of the controlled identifier document. The verifier would also check to make sure that the action being performed is valid and the capability is appropriate for the resource being accessed. If the verification is successful, the server has cryptographically determined that the invoker is authorized to access the @@ -2824,7 +2824,7 @@

    Controllable Identifier Document 1.0

    of the URL scheme and using the supplied options.
  • -If controllerDocument is not a conforming controllable identifier document, +If controllerDocument is not a conforming controlled identifier document, an error MUST be raised and SHOULD convey an error type of INVALID_CONTROLLER_DOCUMENT. @@ -2873,13 +2873,13 @@

    Controllable Identifier Document 1.0

    The following example provides a minimum conformant -controllable identifier document containing a minimum conformant +controlled identifier document containing a minimum conformant verification method as required by the algorithm in this section:

    -
    +
    - Example 19: Minimum conformant controllable identifier document + Example 19: Minimum conformant controlled identifier document
    {
       "id": "https://controller.example/123",
       "verificationMethod": [{
    @@ -2892,17 +2892,17 @@ 

    Controllable Identifier Document 1.0

    }
    -
    Note: Controllable identifier documents can contain references to external verification methods

    +

    Note: Controlled identifier documents can contain references to external verification methods

    Verification method identifiers are expressed as strings that are URLs, or -via the id property, whose value is a URL. It is possible for a controllable identifier document to express a verification method, through a verification relationship, that exists in a place that is external to the controllable identifier document. As described in Section 5.9 Integrity Protection of Controllers, -specifying a verification method that is external to a controllable identifier document is a valid use of this specification. It is vital that this -verification method is retrieved from the external controllable identifier document. +via the id property, whose value is a URL. It is possible for a controlled identifier document to express a verification method, through a verification relationship, that exists in a place that is external to the controlled identifier document. As described in Section 5.9 Integrity Protection of Controllers, +specifying a verification method that is external to a controlled identifier document is a valid use of this specification. It is vital that this +verification method is retrieved from the external controlled identifier document.

    When retrieving any verification method the algorithm above is used to ensure that the verification method is retrieved from the correct -controllable identifier document. The algorithm also ensures that this controllable identifier document refers to the verification method (via a verification relationship) and that the verification method refers to the controllable identifier document (via the verification method's controller property). Failure to +controlled identifier document. The algorithm also ensures that this controlled identifier document refers to the verification method (via a verification relationship) and that the verification method refers to the controlled identifier document (via the verification method's controller property). Failure to use this algorithm, or an equivalent one that performs these checks, can lead to security compromises where an attacker poisons a cache by claiming control of a victim's verification method. @@ -2920,7 +2920,7 @@

    Controllable Identifier Document 1.0

    In the example above, the algorithm described in this section will use the https://external.example/xyz#key-789 URL value as the verification method identifier. The algorithm will then confirm that the verification method -exists in the external controllable identifier document and that the appropriate +exists in the external controlled identifier document and that the appropriate relationships exist as described earlier in this section.

    @@ -2969,22 +2969,22 @@

    Controllable Identifier Document 1.0

    INVALID_CONTROLLER_DOCUMENT_ID (-22)
    -The id value in a controllable identifier document was malformed. See Section +The id value in a controlled identifier document was malformed. See Section 3.3 Retrieve Verification Method.
    INVALID_CONTROLLER_DOCUMENT (-23)
    -The controllable identifier document was malformed. See Section +The controlled identifier document was malformed. See Section 3.3 Retrieve Verification Method.
    INVALID_VERIFICATION_METHOD (-24)
    -The verification method in a controllable identifier document was malformed. See Section +The verification method in a controlled identifier document was malformed. See Section 3.3 Retrieve Verification Method.
    INVALID_RELATIONSHIP_FOR_VERIFICATION_METHOD (-25)
    -The verification method in a controllable identifier document was not +The verification method in a controlled identifier document was not associated using the expected verification relationship as expressed in the proofPurpose property in the proof. See Section 3.3 Retrieve Verification Method. @@ -3121,7 +3121,7 @@

    Controllable Identifier Document 1.0

    -When an application is processing a controllable identifier document, if an @context +When an application is processing a controlled identifier document, if an @context property is not provided in the document or the terms used in the document are not mapped by existing values in the @context property, implementations MUST inject or append an @context property with a value of @@ -3130,9 +3130,9 @@

    Controllable Identifier Document 1.0

    (https://www.w3.org/ns/did/v1).

    -
    +
    - Example 21: A controllable identifier document without an @context property + Example 21: A controlled identifier document without an @context property
    {
       "id": "https://controller.example/101",
       "verificationMethod": [{
    @@ -3237,10 +3237,10 @@ 

    Controllable Identifier Document 1.0

    Binding an entity in the digital world or the physical world to an identifier, to -a controllable identifier document, or to cryptographic material requires the use of +a controlled identifier document, or to cryptographic material requires the use of security protocols contemplated by this specification. The following sections describe some possible scenarios and how an entity therein might prove control -over an identifier or a controllable identifier document for the purposes of authentication or +over an identifier or a controlled identifier document for the purposes of authentication or authorization.

    @@ -3248,9 +3248,9 @@

    Controllable Identifier Document 1.0

    -Proving control over an identifier and/or a controllable identifier document is useful +Proving control over an identifier and/or a controlled identifier document is useful when accessing remote systems. Cryptographic digital signatures enable certain -security protocols related to controllable identifier documents +security protocols related to controlled identifier documents to be cryptographically verifiable. For these purposes, this specification defines useful verification relationships in 2.3.1 Authentication and 2.3.4 Capability Invocation. The secret cryptographic material associated with the verification methods @@ -3263,10 +3263,10 @@

    Controllable Identifier Document 1.0

    -An identifier or controllable identifier document do not inherently carry any +An identifier or controlled identifier document do not inherently carry any personal data and it is strongly advised that non-public entities do not publish personal data in -controllable identifier documents. +controlled identifier documents.

    @@ -3407,7 +3407,7 @@

    Controllable Identifier Document 1.0

    Rotation is a management process that enables the secret cryptographic material associated with an existing verification method to be deactivated or destroyed once a new verification method has been added to the -controllable identifier document. Going forward, any new proofs that a +controlled identifier document. Going forward, any new proofs that a controller would have generated using the old secret cryptographic material can now instead be generated using the new cryptographic material and can be verified using the new verification method. @@ -3441,7 +3441,7 @@

    Controllable Identifier Document 1.0

  • Verification method rotation manifests only as changes to the current or -latest version of a controllable identifier document. +latest version of a controlled identifier document.
  • When a verification method has been active for a long time, or used for @@ -3453,7 +3453,7 @@

    Controllable Identifier Document 1.0

  • Proofs or signatures that rely on verification methods that are not -present in the latest version of a controllable identifier document are not impacted by +present in the latest version of a controlled identifier document are not impacted by rotation. In these cases, verification software might require additional information, such as when a particular verification method was expected to be valid as well as access to a verifiable data registry @@ -3487,7 +3487,7 @@

    Controllable Identifier Document 1.0

    Compromise of the secrets associated with a verification method allows the attacker to use them according to the verification relationship -expressed by controller in the controllable identifier document, for example, for +expressed by controller in the controlled identifier document, for example, for authentication. The attacker's use of the secrets might be indistinguishable from the legitimate controller's use starting from the time the verification method was registered, to the time it was @@ -3516,7 +3516,7 @@

    Controllable Identifier Document 1.0

  • Verification method revocation can only be embodied in changes to -the latest version of a controllable identifier document; it cannot retroactively adjust +the latest version of a controlled identifier document; it cannot retroactively adjust previous versions.
  • @@ -3538,7 +3538,7 @@

    Controllable Identifier Document 1.0

  • -Even if a verification method is present in a controllable identifier document, +Even if a verification method is present in a controlled identifier document, additional information, such as a public key revocation certificate, or an external allow or deny list, could be used to determine whether a verification method has been revoked. @@ -3560,7 +3560,7 @@

    Controllable Identifier Document 1.0

    revoked verification method, knowing whether a verification was made with a revoked verification method is trickier than it might seem. Some auditing systems provide the ability to look back at the state of an identifier at a -point in time, or at a particular version of the controllable identifier document. +point in time, or at a particular version of the controlled identifier document. When such a feature is combined with a reliable way to determine the time or identifier version that existed when a cryptographically verifiable statement was made, then revocation does not undo that statement. This can be the basis @@ -3573,7 +3573,7 @@

    Controllable Identifier Document 1.0

    However, in order for such semantics to be safe, the second condition — an -ability to know what the state of the controllable identifier document was at the time +ability to know what the state of the controlled identifier document was at the time the assertion was made — is expected to apply. Without that guarantee, someone could discover a revoked key and use it to make cryptographically verifiable statements with a simulated date in the past. @@ -3627,17 +3627,17 @@

    Controllable Identifier Document 1.0

    Encryption algorithms have been known to fail due to advances in cryptography and computing power. Implementers are advised to assume that any encrypted data -placed in a controllable identifier document might eventually be made available in clear text +placed in a controlled identifier document might eventually be made available in clear text to the same audience to which the encrypted data is available. This is -particularly pertinent if the controllable identifier document is public. +particularly pertinent if the controlled identifier document is public.

    -Encrypting all or parts of a controllable identifier document is not an appropriate +Encrypting all or parts of a controlled identifier document is not an appropriate means to protect data in the long term. Similarly, placing encrypted data in -a controllable identifier document is not an appropriate means to protect personal data. +a controlled identifier document is not an appropriate means to protect personal data.

    -Given the caveats above, if encrypted data is included in a controllable identifier document, +Given the caveats above, if encrypted data is included in a controlled identifier document, implementers are advised to not associate any correlatable information that could be used to infer a relationship between the encrypted data and an associated party. Examples of correlatable information include @@ -3651,18 +3651,18 @@

    Controllable Identifier Document 1.0

    5.8 Content Integrity Protection

    -Controllable identifier documents that include links to external machine-readable +Controlled identifier documents that include links to external machine-readable content such as images, web pages, or schemas are vulnerable to tampering. It is strongly advised that external links are integrity protected using mechanisms to secure related resources such as those described in the Verifiable Credentials Data Model v2.0 specification. External links are to be avoided if they cannot be integrity -protected and the controllable identifier document's integrity is dependent on the +protected and the controlled identifier document's integrity is dependent on the external link.

    -One example of an external link where the integrity of the controllable identifier document itself could be affected is the JSON-LD Context [JSON-LD11], +One example of an external link where the integrity of the controlled identifier document itself could be affected is the JSON-LD Context [JSON-LD11], when present. To protect against compromise, -controllable identifier document consumers using JSON-LD are advised to cache +controlled identifier document consumers using JSON-LD are advised to cache local static copies of JSON-LD contexts and/or verify the integrity of external contexts against a cryptographic hash that is known to be associated with a safe version of the external JSON-LD Context. @@ -3674,8 +3674,8 @@

    Controllable Identifier Document 1.0

    As described in Section 2.1.2 Controllers, this specification includes a -mechanism by which to delegate change control of a controllable identifier document to -an entity that is described in an external controllable identifier document through the +mechanism by which to delegate change control of a controlled identifier document to +an entity that is described in an external controlled identifier document through the use of the controller property.

    @@ -3686,7 +3686,7 @@

    Controllable Identifier Document 1.0

    provide account recovery services, among other use cases. In such scenarios, it can be beneficial to allow the guardian to manage the rotation of their own key material. It can also be beneficial for the delegator to associate -a cryptographic hash of the remote controllable identifier document to "pin" the +a cryptographic hash of the remote controlled identifier document to "pin" the remote document to a known good value.

    @@ -3731,10 +3731,10 @@

    Controllable Identifier Document 1.0

    assertion and authentication might be used in some of these situations, information about the applied security context might need to be expressed and provided to a verifier. Whether and how -to encode this information in the controllable identifier document data model is out +to encode this information in the controlled identifier document data model is out of scope for this specification. Interested readers might note that 1) the information could be transmitted using Verifiable Credentials -[VC-DATA-MODEL-2.0], and 2) the controllable identifier document data model can be +[VC-DATA-MODEL-2.0], and 2) the controlled identifier document data model can be extended to incorporate this information.

    @@ -3743,7 +3743,7 @@

    Controllable Identifier Document 1.0

    -If a controllable identifier document publishes a service intended for authentication +If a controlled identifier document publishes a service intended for authentication or authorization of the subject (see Section 2.1.4 Services), it is the responsibility of the service provider, subject, and/or requesting party to comply with the requirements of the authentication and/or authorization @@ -3757,29 +3757,29 @@

    Controllable Identifier Document 1.0

    -Since controllable identifier documents are designed to be administered directly by +Since controlled identifier documents are designed to be administered directly by the controller, it is critically important to apply the principles of Privacy by Design [PRIVACY-BY-DESIGN] to all aspects of the -controllable identifier document. All seven of these principles have been applied +controlled identifier document. All seven of these principles have been applied throughout the development of this specification. The design used in this specification does not assume that there is a registrar, hosting company, nor other intermediate service provider to recommend or apply additional privacy safeguards. Privacy in this specification is preventive, not remedial, and is an embedded default. The following sections cover privacy considerations that -implementers might find useful when building systems that utilize controllable identifier documents. +implementers might find useful when building systems that utilize controlled identifier documents.

    6.1 Keep Personal Data Private

    -If a controllable identifier document is about a specific individual and is -public-facing, it is critical that controllable identifier documents contain +If a controlled identifier document is about a specific individual and is +public-facing, it is critical that controlled identifier documents contain no personal biometric or biographical data. While it is true that personal data might include pseudonymous information, such as a public cryptographic key or an IP address, publishing that sort of information does not create the same immediate privacy dangers as publishing an individual's full name, profile photo, or social media -account in a controllable identifier document. A better alternative is to transmit +account in a controlled identifier document. A better alternative is to transmit such personal data through other means such as verifiable credentials [VC-DATA-MODEL-2.0] or other data formats sent over private and secure communication channels. @@ -3809,7 +3809,7 @@

    Controllable Identifier Document 1.0

    (tracking). Those that use this specification are warned that there are trade-offs with each approach and to use the mechanism that maximizes security and privacy according to the needs of the individual or organization. Using a -controllable identifier document for all use cases is not always advantageous when a +controlled identifier document for all use cases is not always advantageous when a same-origin bound cryptographic key would suffice.

    @@ -3834,9 +3834,9 @@

    Controllable Identifier Document 1.0

    The anti-correlation protections of pairwise identifiers are easily defeated -if the data in the corresponding controllable identifier documents can be correlated. For -example, using identical verification methods in multiple controllable identifier documents can provide as much correlation information as using the same -identifier. Therefore, the controllable identifier document for a pairwise identifier +if the data in the corresponding controlled identifier documents can be correlated. For +example, using identical verification methods in multiple controlled identifier documents can provide as much correlation information as using the same +identifier. Therefore, the controlled identifier document for a pairwise identifier also needs to use pairwise unique information, such as ensuring that verification methods are unique to the pairwise relationship.

    @@ -3846,7 +3846,7 @@

    Controllable Identifier Document 1.0

    6.5 Subject Classification

    -It is dangerous to add properties to the controllable identifier document that can be +It is dangerous to add properties to the controlled identifier document that can be used to indicate, explicitly or through inference, what type or nature of thing the subject is, particularly if the subject is a person.

    @@ -3854,19 +3854,19 @@

    Controllable Identifier Document 1.0

    Not only do such properties potentially result in personal data (see 6.1 Keep Personal Data Private) or correlatable data (see 6.3 Identifier Correlation Risks and 6.4 Controller Document Correlation Risks) being present in -the controllable identifier document, but they can be used for grouping particular +the controlled identifier document, but they can be used for grouping particular identifiers in such a way that they are included in or excluded from certain operations or functionalities.

    -Including type information in a controllable identifier document can result +Including type information in a controlled identifier document can result in personal privacy harms even for subjects that are non-person entities, such as IoT devices. The aggregation of such information around a controller could serve as a form of digital fingerprint and this is best avoided.

    -To minimize these risks, all properties in a controllable identifier document ought to +To minimize these risks, all properties in a controlled identifier document ought to be for expressing verification methods and verification relationships related to using the identifier.

    @@ -3876,21 +3876,21 @@

    Controllable Identifier Document 1.0

    6.6 Service Privacy

    -The ability for a controller to optionally express at least one service in the controllable identifier document increases their control and agency. -Each additional endpoint in the controllable identifier document adds privacy risk either +The ability for a controller to optionally express at least one service in the controlled identifier document increases their control and agency. +Each additional endpoint in the controlled identifier document adds privacy risk either due to correlation, such as across endpoint descriptions, or because the services are not protected by an authorization mechanism, or both.

    -Controllable identifier documents are often public and, since they are standardized, will +Controlled identifier documents are often public and, since they are standardized, will be stored and indexed efficiently. This -risk is increased if controllable identifier documents are published to immutable -verifiable data registries. Access to a history of the controllable identifier documents referenced by a URL enables a form of traffic analysis made more +risk is increased if controlled identifier documents are published to immutable +verifiable data registries. Access to a history of the controlled identifier documents referenced by a URL enables a form of traffic analysis made more efficient through the use of standards.

    The degree of additional privacy risk caused by including multiple services in -one controllable identifier document can be difficult to estimate. Privacy harms are +one controlled identifier document can be difficult to estimate. Privacy harms are typically unintended consequences. URLs can refer to documents, services, schemas, and other things that might be associated with individual people, households, clubs, and employers — and correlation of their services @@ -3958,7 +3958,7 @@

    Controllable Identifier Document 1.0

    This specification registers the application/cid media type specifically for -identifying documents conforming to the controllable identifier document +identifying documents conforming to the controlled identifier document format.

  • @@ -4061,9 +4061,9 @@

    Controllable Identifier Document 1.0

    } -
    +
    - Example 28: Multiple public keys encoded as Multikeys in a controllable identifier document + Example 28: Multiple public keys encoded as Multikeys in a controlled identifier document
    {
       "@context": "https://www.w3.org/ns/controller/v1",
       "id": "https://controller.example/123",
    @@ -4172,9 +4172,9 @@ 

    Controllable Identifier Document 1.0

    }
    -
    +
    - Example 33: Multiple public keys encoded as JsonWebKey in a controllable identifier document + Example 33: Multiple public keys encoded as JsonWebKey in a controlled identifier document
    {
       "@context": "https://www.w3.org/ns/controller/v1",
       "id": "https://controller.example/123",
    @@ -4436,18 +4436,18 @@ 

    Controllable Identifier Document 1.0