-
Notifications
You must be signed in to change notification settings - Fork 110
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Addressing Verifier Stored Data Vulnerabilities and Legal Compliance #1247
Comments
The issue was discussed in a meeting on 2023-08-23
View the transcript3.3. Addressing Verifier Stored Data Vulnerabilities and Legal Compliance (issue vc-data-model#1247)See github issue vc-data-model#1247. Brent Zundel: I believe all the horizontal reviews are before CR. Manu Sporny: I think we can pick-and-choose, as not all of them are requesting normative changes.
Brent Zundel: Once we go to CR, we'll be asking PING for another review, so not having addressed those would be awkward. Manu Sporny: We can avoid asking for another review until we're ready. Brent Zundel: Yes, that will work. Manu Sporny: I think this is post-CR. Sebastian Crane: Thank you. So, my gut feeling is that this is Pre-CR, there are a lot of situations where privacy and security is left up to implementers. The general record is that implementers don't address those adequately. Since VCs have at heart security and privacy, I think we should have a go at including statements like "you should not keep PII in this manner for this amount of time" as that might take a while to resolve. Manu Sporny: I am very concerned about having that discussion in this group. This is because it's not testable, and that there are use-cases where retention may be required by law.
Sebastian Crane: I'm not suggesting in response to Manu. I'm not suggesting we add normative statements, but I'm suggesting we prioritize discussion about that issue to see if there are any normative statements that are effectively statements. Like what you said, Manu, about requiring something in one context and not others. We should prioritize figuring these things out that we've been notified of. |
The issue was discussed in a meeting on 2023-09-06
View the transcript4.4. Addressing Verifier Stored Data Vulnerabilities and Legal Compliance (issue vc-data-model#1247)See github issue vc-data-model#1247. Sebastian Crane: status update: I am going to work on it in the next few days. |
@seabass-labrax I do not think anything more than something like this is required https://datatracker.ietf.org/doc/html/draft-ietf-oauth-selective-disclosure-jwt-05#name-storage-of-signed-user-data)#name-storage-of-signed-user-data |
sorry closed by mistake |
The issue was discussed in a meeting on 2023-09-14
View the transcript2.5. Addressing Verifier Stored Data Vulnerabilities and Legal Compliance (issue vc-data-model#1247)See github issue vc-data-model#1247. Brent Zundel: next up 1247. Verifier stored data vulnerabilities. Sebastian Crane: there's a lot here.
Brent Zundel: as far as the scope about what we can make recommendations for, we can make recommendations for those who are users of our data model.
Brent Zundel: we can add something in the privacy considerations sections, but its not in our scope to normatively address processing concerns. Manu Sporny: +1 to Kristina put into chat.
Manu Sporny: What PING did in the review is that we say something about it. Not that we need to fix it, but add something to the privacy considerations. Sebastian Crane: I agree with you. This is something the PING group is not asking us to address. So tentatively, we could mark this as Ready for PR. Brent Zundel: it sounds like you could introduce a PR that would address this issue. So, if that's right, let's label it ready for PR. Sebastian Crane: that's ok. but to take advantage of this meeting, we need to do as much as possible within this charter to help privacy. Brent Zundel: what's the timeline for a PR. Sebastian Crane: I can make it a priority to get it by the end of next week. Kristina Yasuda: Are you going to object? Sebastian Crane: no. but I'm concerned there may be. Brent Zundel: next step: PR. Sooner is better. |
@seabass-labrax speaking as the PING reviewer for this issue, at the data model layer I think what @Sakurann is saying is suffice. However, what you're saying I think is absolutely a concern at the governance layer (hence wanting to mention here so we can reference it when people speak to policy makers) and needs to be able to normatively define at there. Unfortunately, the data model layer nor the protocol layer can handle this sense once the bits are sent there's no way to determine what the recipient does with them. |
The issue was discussed in a meeting on 2023-09-15
View the transcript3.2. Addressing Verifier Stored Data Vulnerabilities and Legal Compliance (issue vc-data-model#1247)See github issue vc-data-model#1247. Brent Zundel: What is the plan for this item moving forward. Kristina Yasuda: There needs to be a recommendation on how verifier stores/manages user data, we need something around that, something similar -- is that sufficient? Doing all we can at technology level, everything else at governance layer. Nick Doty: I understand that some things have to be enforced elsewhere, is it standardized to communicate that something shouldn't be stored, or hope that receiver shouldn't know that things should be stored. Kristina Yasuda: There are ways to communicate that -- intent to retain, but that's out of scope, we can only talk about data model and how to sign it, we could tell people to use protocols to use those features. Nick Doty: One of the challenges of having all these different layers/specs -- don't immediately have an idea on flags being needed in data model vs. protocol, where should that flag be? It just seems unlikely that we can expect receiver of the data to know how they should treat the data or user can make decision w/o having some promise about what they're going to do w/ the data. Manu Sporny: we have terms of use, but it is set to be deprecated. Nick Doty: We can't define how to enforce that in this group, we might want to figure out how to do that. Dmitri Zagidulin: The thing that comes to mind here is know verifier list -- by having to present a trusted UI to the user "so and so company is requesting credentials" -- we need "known verifier lists" vs. "known issuer lists" for issuance. The data retention policy can be stated and monitored and legally enforced on that layer. Known verifier lists are coming down the pipeline eventually, something to think about. |
The issue was discussed in a meeting on 2023-11-15
View the transcript3.1. Addressing Verifier Stored Data Vulnerabilities and Legal Compliance (issue vc-data-model#1247)See github issue vc-data-model#1247. Manu Sporny: This came from the PING review, and I'll work with Sebastian on it. |
PR #1356 has been merged, closing. |
From PING review w3cping/privacy-request#121 (comment):
The text was updated successfully, but these errors were encountered: