Comment by cakealert

Comment by cakealert 3 days ago

5 replies

It would appear most of the people commenting on the subject don't even understand it.

With privacy preserving cryptography the tokens are standalone and have no ties to the identity that spawned them.

No enforcement for abuse is possible.

overfeed 2 days ago

> With privacy preserving cryptography the tokens are standalone and have no ties to the identity that spawned them.

I suspect there will be different levels of attestations from the anonymous ("this is an adult"), to semi-anonymous ("this person was born in 20YY and resides in administrative region XYZ") to the compete record ("This is John Quincy Smith III born on YYYY-MM-DD with ID doc number ABC123"). Somewhere in between the extremes is an pseudonymous token that's strongly tied to a single identity with non-repudiation.

Anonymous identities that can be easily churned out on demand by end-users have zero antibot utility

  • cakealert 2 days ago

    The latter attestation will be completely useless for privacy.

    • overfeed 20 hours ago

      100% agree, but it will be necessary for any non-repudiation use cases, like signing contracts remotely. There is no one size fits all approach for online identity management.

palata 3 days ago

Right, that's my feeling as well

  • overfeed 2 days ago

    While it's the privacy advocate's ideal, the politics reality is very few governments will deploy "privacy preserving" cryptography that gets in the way of LE investigations[1]. The best you can hope for is some escrowed service that requires a warrant to unmask the identity for any given token, so privacy is preserved in most cases, and against most parties except law enforcement when there's a valid warrant.

    1. They can do it overtly in thr design of the system, or covertly via side-channels, logging, or leaking bits in ways that are hard for an outsider to investigate without access to the complete source code and or/system outputs, such as not-quite-random pseudo-randoms.