SlideShare a Scribd company logo
IDENTITY & TRUST IN MONITORED SPACES
THE VIRTUES OF PRIVACY BY DESIGN
Eleanor McHugh
Romek Szczesniak
Cryptographer
Security Architect
Physicist
Transport Architecture
1998 PKI
elliptic curves
satellite PSN
1999 π-calculus VM
2000 control networks
2001 mobile identity
secure documents
2003 ENUM
2006 dotTel
hybrid encryption
2007 encrypted DNS
2010 concurrent VM
2011 national eID
2012 encrypted SQL
privacy by design
2014 uPass
2018 Redbush
Agora
PRIVACY AND SECURITY
➤ digital data is easily duplicated
➤ when data moves or is stored it generates
metadata which is itself digital data
➤ processing data or metadata can reveal
identity even if any personally identifying
data it contains is encrypted
➤ so a system which respects privacy needs to
know as little as practical about
➤ the data it processes
➤ the metadata it produces
fraud and even
household names
have fallen foul to
criminal hackers.
In response to the
public outcry
ambitious regulations have been introduced
such as the European Union’s GDPR and
Whenever your org
personal data you
consent from its su
guardian and you
by demand
UK LEGAL IDENTITY
➤ birth certificate and gender recognition
certificate are the primary identity
documents
➤ with either it's possible to get
➤ national insurance number
➤ NHS medical card
➤ passport
➤ name can be changed with a deed poll or a
statutory declaration
➤ none of these documents include
biometrics
ATTRIBUTES
➤ attributes are discrete facts
➤ dark hair
➤ wears black
➤ professional cryptographer
➤ fragments of an identity
➤ they may be entirely absent
➤ or some may be imprecise
➤ even a complete set may not be unique
➤ they're only as trustworthy as their origins
anonymity
pseudonymity
anonymity
pseudonymity
anonymity
pseudonymity
anonymity
pseudonymity
anonymity
pseudonymity
anonymity
pseudonymity
“What’s in a name?
That which we call a rose,
by any other name would
smell as sweet.”
William Shakespeare
SECURE TOKENS
➤ tokens alone are not proofs of the identity
of their bearer
➤ a biometric needs to be captured to
associate a token with an identifiable
human being
➤ and the biometric must be confirmed by a
person or an algorithmic process at the
time identity is being asserted to perform
an identification
➤ evidence that this has occurred should be
recorded if this needs to be confirmed at a
later date such as in a court of law
BIOMETRICS
➤ if it can be measured and tends towards
uniqueness…
➤ faces
➤ fingerprints
➤ iris patterns
➤ retina patterns
➤ genetic fingerprints
➤ electrocardiogram
➤ electroencephalogram
➤ it can also be duplicated and counterfeited!
ID CARD
➤ photo for visual comparison
➤ hologram to assert validity
➤ date of birth reveals age
➤ serial number allows this card to be
recorded and tracked
➤ physical security features increase the cost
of counterfeiting
➤ smart card features allow a card to be used
with digital scanners
➤ but how much scrutiny will be applied
when the card is used?
LIVENESS
➤ digital data is easily copied
➤ replay attacks repeat a previously captured
biometric
➤ spoofing creates a facsimile of a biometric
capable of fooling a digital system
➤ proofs
➤ is data being captured now
➤ is it from a genuine source
➤ has it been tampered with
➤ is it likely to be unique
TRUST ARBITRATION
➤ a contract is an agreement to do something
between two parties
➤ in Common Law this requires both intent
and an exchange of consideration
➤ a contract can be enforced by the courts
even if it has no written form
➤ trust relies on recognised authority and
transparency of process
➤ the internet has no courts and machines
lack intent so we must provide witnesses
that a human decision was made and rely
on off-line courts to resolve disputes
CHECKING IDENTITY
➤ each exchange of identity comes with proof
that the exchange occurred
➤ proof engenders trust
➤ we anchor trust in information based on its
provenance and its tamper-resistance
➤ we can also capture proof of why the
exchange occurred
➤ we can record these proofs for future
reference
➤ good bookkeeping is at the heart of all
identity schemes
THE CRYPTO TOOLBAG
➤ HMAC hashes are large numbers computed
from a set of data with cryptography
➤ any change to the set of data will result in a
different HMAC value being calculated
➤ symmetric encryption allows two parties
with the same key to communicate securely
➤ public key encryption keeps the decryption
key secret
➤ hybrid encryption allows a symmetric key
to be shared as data by encrypting it with a
public key
UNIQUENESS
➤ a one-time pad is a single use key for
encrypting a message
➤ it provides a unique mapping between the
encrypted content and the keys to generate
and recover that content
➤ it provides perfect secrecy as there are no
variant encrypted texts which can reveal
elements of the keys
➤ one-time pads require key management
which guarantees uniqueness and
randomness
IMMUTABILITY
➤ singly-linked lists are a popular abstraction
in computer science
➤ they allow several lists to share common
starting segments
➤ a hash chain extends this concept with
computed hashes for each element and an
optional signature to validate them
➤ alter one item in the chain and all
subsequent hashes must be recalculated for
the signature to remain valid
INTEGRITY
➤ trees are another popular data structure
related to lists but used to capture
hierarchical structures and optimise search
➤ Merkle trees are trees built from hash
chains
➤ adding to the tree creates a new root
element whose hash proves the integrity of
its links and leaf elements
➤ building many overlapping trees ensures
that changes to one tree will invalidate
other trees
BLOCKCHAIN
➤ Bitcoin uses a hash chain of Merkle trees
packaged as blocks of information to
provide nonrepudiation
➤ the hash chain can be forked deliberately or
as a result of network partitioning
➤ the Bitcoin consensus algorithm is based on
proof of work which limits the rate at
which transactions can be performed
➤ and if forks are later merged together then
the shorter fork is discarded
➤ forks can overcome this by using sidechains
for exchange
ROUTING
➤ the internet comprises a decentralised
physical infrastructure
➤ most applications are built with a
centralised client-server model which hides
this reality
➤ servers act as trust anchors
➤ blockchain mining & etherium dApps are
fully distributed
➤ lacking servers they require a consensus
algorithm to agree a trusted reality
CASE STUDY:
DESIGNING
UPASS
patented by Yoti Ltd, 130 Fenchurch Street, London
PRINCIPLES
➤ UK common law identity
➤ functional anonymity
➤ resistant to mass surveillance
➤ a reliable source of information even if the
information itself is unreliable
➤ transactions are fast with minimal need for
consensus or protocol handshakes
➤ can be scaled to a global system
➤ works on desktop, mobile & IoT platforms
OVERVIEW
➤ an anchor document underlies each identity
➤ mobile-centric design
➤ everything happens on the handset
➤ QR codes for easy token sharing
➤ validation service
➤ check tokens
➤ release information
➤ secure store is an encrypted datastore
➤ one-directional flows share trust between
all three actors
REGISTRATION
➤ digitise anchor document
➤ capture selfie
➤ create profiles
➤ anonymous
➤ date of birth
➤ name
➤ nationality
➤ generate encryption keys
➤ record phone address
➤ issue anonymous profile credential
TRANSACTIONS
➤ a customer presents a profile credential to a
merchant
➤ the merchant adds a credential of their own
➤ both credentials are sent to validation server
➤ the validation server confirms the credentials
are known to it
➤ it invalidates these and sends receipts directly
to both customer and merchant
➤ the receipts provide fresh credentials
➤ only the server
➤ knows the delivery addresses
➤ can make fresh credentials
PROFILES
➤ a set of keys and their associated values
➤ essentially a web form
➤ anchored to a document or assigned by
another profile
➤ has a confidence value based on its
provenance and usage
➤ is immutable and links to previous versions
of itself
➤ has an associated selfie chain with photos
of its owner
➤ anonymity is represented by a profile
containing no keys or values
CONFIDENCE
➤ courts reach a verdict by judging the
relative credibility of evidence & witnesses
➤ a distributed ledger which is very difficult
to tamper with provides a powerful witness
➤ and each anchor document is a witness of
the profile data depending on it
➤ a profile's associated selfie can be inspected
by its recipient at the time the transaction
takes place and compared with the
presenter's face
➤ combined with a confidence value this
provides a reasonable basis for making
informed choices
RECEIPTS
➤ receipts come in pairs
➤ each receipt has links to the relevant
information about the other party
➤ links are included to the profile presented
and to any profiles previously assigned by
the recipient
➤ receipts are encrypted with a symmetric key
specific to the profile used by the recipient
➤ and they contain a shared key which is
unique to this transaction
➤ each receipt contains a link to the previous
transaction performed by this profile
MASTER RECEIPTS
➤ receipt pairs are recorded opaquely as
master receipts in the secure store
➤ a master receipt is encrypted with the
shared transaction key
➤ the transaction key is never recorded in the
secure store
➤ master receipts form a chain
➤ the index for this chain is calculated from
the credentials used but these are only
stored in the receipt pair
FACE RECOGNITION
➤ the human brain is generally good at
looking for and identifying faces
➤ machines can be taught to match faces by
reducing them to a templated form
➤ this templated form can act as an index to
return one associated identity among many
➤ or it can be associated with a particular
profile and used to confirm identity
➤ each source image for the template and
their order are recorded in a blockchain
➤ this allows the template to be recalculated
for any point in a profile's history
BIOMETRIC LIVENESS
➤ to be practical a biometric should be simple
to capture & tamper resistant
➤ it should also have a differential property
which can be used to test it's live
➤ pupillary response to a succession of bright
flashes of light has calculable properties
➤ and eye movement may be guided using a
shared cryptographic secret which will be
unique to a particular device
➤ the server sets the parameters randomly for
each test making the results unique to this
particular interaction
FIG. 5D
time
Pupillary area
Constriction
δt
first pulse
applied
second pulse
applied
t1 t2
FIG. 4
D
SF_t
SF_(t_n)
W
FIG. 8
W
W
FIG. 9
W
FIG. 8
W
W
120c
y
x
Liveness
Eye
tracking
Enrolment
b
S1104b
S1112
S1110b
Cv Cv’
ET params
PD results
+ sig+URI
ET results
+ sig+URI
Access
control
214
104
120a
120b
120c
δt
time
Pupillary area
y
x
Pupil
dilation
Liveness
Eye
tracking
Enrolment
FIG. 11
S1102a
S1102b
S1104a
S1104b
S1106
S1108a
S1108b
S1112
S1110a
S1110b
130
Cv Cv’
PD params
ET params
Collect liveness
detection data
S1107
1102a
1102b
PD results PD+ET sig
ET results PD+ET sig
PD+ET params
+PD and ET server URIs
1101
PD results
+ sig+URI
ET results
+ sig+URI
Access
control
214
DEVICE LIVENESS
➤ live biometric responses with random
parameters give us unique values
➤ by controlling where and how these are
delivered we can prove uniqueness of our
current interaction
➤ as a result we can prove the device is live
➤ as with a transaction we use one-way
messaging which can reduce the ability of
an eavesdropper to apply flow analysis
WEB CONNECT+
➤ sometimes we need to perform transactions
via an untrusted intermediary
➤ These are potentially subject to Man-in-the-
Middle attacks
➤ by having a remote server use our device as
a validator we can perform a transaction
and give them access to a secure back
channel
➤ now we can monitor & control their
connection to our untrusted intermediary
➤ Essentially the remote site has to login to
our local system
ASSET TRACKING
➤ the building blocks of uPass can provide
identity to things as well as people
➤ we can use this fact to create private
identity spaces unique to a particular asset
class such as event tickets
➤ this can be used to control how the asset
changes hands
WWW.INIDSOL.UK
www.slideshare.net/feyeleanor

More Related Content

What's hot

Ppt presentation 1
Ppt presentation 1Ppt presentation 1
Ppt presentation 1
Guntakatla PanduRangarao
 
A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem  A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem
IJECEIAES
 
IRJET- Blockchain Technology for Agriculture Development
IRJET- Blockchain Technology for Agriculture DevelopmentIRJET- Blockchain Technology for Agriculture Development
IRJET- Blockchain Technology for Agriculture Development
IRJET Journal
 
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET-  	  Secure Online Voting Systems using Block of ChunksIRJET-  	  Secure Online Voting Systems using Block of Chunks
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET Journal
 
Gayatri the process of signing your document digitally can be t
Gayatri the process of signing your document digitally can be tGayatri the process of signing your document digitally can be t
Gayatri the process of signing your document digitally can be t
RAHUL126667
 
IRJET- Credible Data through Distributed Ledger Technology
IRJET-  	  Credible Data through Distributed Ledger TechnologyIRJET-  	  Credible Data through Distributed Ledger Technology
IRJET- Credible Data through Distributed Ledger Technology
IRJET Journal
 
Blockchain Fundamentals
Blockchain FundamentalsBlockchain Fundamentals
Blockchain Fundamentals
Santiago Rivera González
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
LeMeniz Infotech
 
Blockchain-Based Transformation: A Gartner Trend Insight Report
Blockchain-Based Transformation: A Gartner Trend Insight ReportBlockchain-Based Transformation: A Gartner Trend Insight Report
Blockchain-Based Transformation: A Gartner Trend Insight Report
Santiago Rivera González
 
IRJET- Security Threats on Blockchain and its Countermeasures
IRJET- Security Threats on Blockchain and its CountermeasuresIRJET- Security Threats on Blockchain and its Countermeasures
IRJET- Security Threats on Blockchain and its Countermeasures
IRJET Journal
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Nexgen Technology
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Shakas Technologies
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
Pvrtechnologies Nellore
 
Grid security seminar mohit modi
Grid security seminar mohit modiGrid security seminar mohit modi
Grid security seminar mohit modi
Mohit Modi
 
Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04
Synacts
 
P8 a blockchain framework for insurance processes
P8 a blockchain framework for insurance processesP8 a blockchain framework for insurance processes
P8 a blockchain framework for insurance processes
devid8
 
THE BITCOINHEIST: CLASSIFICATIONS OF RANSOMWARE CRIME FAMILIES
THE BITCOINHEIST: CLASSIFICATIONS OF RANSOMWARE CRIME FAMILIESTHE BITCOINHEIST: CLASSIFICATIONS OF RANSOMWARE CRIME FAMILIES
THE BITCOINHEIST: CLASSIFICATIONS OF RANSOMWARE CRIME FAMILIES
ijcsit
 
25 7351 9003-1-ed secure cloud (edit a)
25 7351 9003-1-ed secure cloud (edit a)25 7351 9003-1-ed secure cloud (edit a)
25 7351 9003-1-ed secure cloud (edit a)
IAESIJEECS
 

What's hot (19)

Ppt presentation 1
Ppt presentation 1Ppt presentation 1
Ppt presentation 1
 
A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem  A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem
 
IRJET- Blockchain Technology for Agriculture Development
IRJET- Blockchain Technology for Agriculture DevelopmentIRJET- Blockchain Technology for Agriculture Development
IRJET- Blockchain Technology for Agriculture Development
 
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET-  	  Secure Online Voting Systems using Block of ChunksIRJET-  	  Secure Online Voting Systems using Block of Chunks
IRJET- Secure Online Voting Systems using Block of Chunks
 
Gayatri the process of signing your document digitally can be t
Gayatri the process of signing your document digitally can be tGayatri the process of signing your document digitally can be t
Gayatri the process of signing your document digitally can be t
 
IRJET- Credible Data through Distributed Ledger Technology
IRJET-  	  Credible Data through Distributed Ledger TechnologyIRJET-  	  Credible Data through Distributed Ledger Technology
IRJET- Credible Data through Distributed Ledger Technology
 
Blockchain Fundamentals
Blockchain FundamentalsBlockchain Fundamentals
Blockchain Fundamentals
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
Blockchain-Based Transformation: A Gartner Trend Insight Report
Blockchain-Based Transformation: A Gartner Trend Insight ReportBlockchain-Based Transformation: A Gartner Trend Insight Report
Blockchain-Based Transformation: A Gartner Trend Insight Report
 
IRJET- Security Threats on Blockchain and its Countermeasures
IRJET- Security Threats on Blockchain and its CountermeasuresIRJET- Security Threats on Blockchain and its Countermeasures
IRJET- Security Threats on Blockchain and its Countermeasures
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
Grid security seminar mohit modi
Grid security seminar mohit modiGrid security seminar mohit modi
Grid security seminar mohit modi
 
Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04
 
P8 a blockchain framework for insurance processes
P8 a blockchain framework for insurance processesP8 a blockchain framework for insurance processes
P8 a blockchain framework for insurance processes
 
THE BITCOINHEIST: CLASSIFICATIONS OF RANSOMWARE CRIME FAMILIES
THE BITCOINHEIST: CLASSIFICATIONS OF RANSOMWARE CRIME FAMILIESTHE BITCOINHEIST: CLASSIFICATIONS OF RANSOMWARE CRIME FAMILIES
THE BITCOINHEIST: CLASSIFICATIONS OF RANSOMWARE CRIME FAMILIES
 
75
7575
75
 
25 7351 9003-1-ed secure cloud (edit a)
25 7351 9003-1-ed secure cloud (edit a)25 7351 9003-1-ed secure cloud (edit a)
25 7351 9003-1-ed secure cloud (edit a)
 

Similar to Identity & trust in Monitored Spaces

Anonymity, identity, trust
Anonymity, identity, trustAnonymity, identity, trust
Anonymity, identity, trust
Eleanor McHugh
 
Don't Ask, Don't Tell - The Virtues of Privacy By Design
Don't Ask, Don't Tell - The Virtues of Privacy By DesignDon't Ask, Don't Tell - The Virtues of Privacy By Design
Don't Ask, Don't Tell - The Virtues of Privacy By Design
Eleanor McHugh
 
Anonymity, trust, accountability
Anonymity, trust, accountabilityAnonymity, trust, accountability
Anonymity, trust, accountability
Eleanor McHugh
 
Anonymity, Trust, Accountability
Anonymity, Trust, AccountabilityAnonymity, Trust, Accountability
Anonymity, Trust, Accountability
ForgeRock Identity Tech Talks
 
Understanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerUnderstanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets Layer
CheapSSLUSA
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
Venkatesh Jambulingam
 
Cisco cybersecurity essentials chapter -5
Cisco cybersecurity essentials chapter -5Cisco cybersecurity essentials chapter -5
Cisco cybersecurity essentials chapter -5
Mukesh Chinta
 
Uport a blockchain platform for self-sovereign identity
Uport   a blockchain platform for self-sovereign identityUport   a blockchain platform for self-sovereign identity
Uport a blockchain platform for self-sovereign identity
Ian Beckett
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
Sumanth Paramesh
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
Sumanth Paramesh
 
How encryption works
How encryption worksHow encryption works
How encryption works
RaxTonProduction
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and ApplicationsSvetlin Nakov
 
Block chains and crypto currencies - introduction
Block chains and crypto currencies - introductionBlock chains and crypto currencies - introduction
Block chains and crypto currencies - introduction
Initio
 
IS-Crypttools.pptx
IS-Crypttools.pptxIS-Crypttools.pptx
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
JUSTSTYLISH3B2MOHALI
 
Blockchains Impact on Identity Management.pdf
Blockchains Impact on Identity Management.pdfBlockchains Impact on Identity Management.pdf
Blockchains Impact on Identity Management.pdf
niahiggins21
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems
Maganathin Veeraragaloo
 
IDC Research Paper Looks at Ensuring and Proving Big Data is Tamper-Free
IDC Research Paper Looks at Ensuring and Proving Big Data is Tamper-FreeIDC Research Paper Looks at Ensuring and Proving Big Data is Tamper-Free
IDC Research Paper Looks at Ensuring and Proving Big Data is Tamper-Free
flashnewsrelease
 
Blockchains Impact on Identity Management.pdf
Blockchains Impact on Identity Management.pdfBlockchains Impact on Identity Management.pdf
Blockchains Impact on Identity Management.pdf
matthew09cyrus
 
Truzzt box 3.2-en
Truzzt box 3.2-enTruzzt box 3.2-en
Truzzt box 3.2-en
h-bauer2014
 

Similar to Identity & trust in Monitored Spaces (20)

Anonymity, identity, trust
Anonymity, identity, trustAnonymity, identity, trust
Anonymity, identity, trust
 
Don't Ask, Don't Tell - The Virtues of Privacy By Design
Don't Ask, Don't Tell - The Virtues of Privacy By DesignDon't Ask, Don't Tell - The Virtues of Privacy By Design
Don't Ask, Don't Tell - The Virtues of Privacy By Design
 
Anonymity, trust, accountability
Anonymity, trust, accountabilityAnonymity, trust, accountability
Anonymity, trust, accountability
 
Anonymity, Trust, Accountability
Anonymity, Trust, AccountabilityAnonymity, Trust, Accountability
Anonymity, Trust, Accountability
 
Understanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerUnderstanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets Layer
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
 
Cisco cybersecurity essentials chapter -5
Cisco cybersecurity essentials chapter -5Cisco cybersecurity essentials chapter -5
Cisco cybersecurity essentials chapter -5
 
Uport a blockchain platform for self-sovereign identity
Uport   a blockchain platform for self-sovereign identityUport   a blockchain platform for self-sovereign identity
Uport a blockchain platform for self-sovereign identity
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
 
Block chains and crypto currencies - introduction
Block chains and crypto currencies - introductionBlock chains and crypto currencies - introduction
Block chains and crypto currencies - introduction
 
IS-Crypttools.pptx
IS-Crypttools.pptxIS-Crypttools.pptx
IS-Crypttools.pptx
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
 
Blockchains Impact on Identity Management.pdf
Blockchains Impact on Identity Management.pdfBlockchains Impact on Identity Management.pdf
Blockchains Impact on Identity Management.pdf
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems
 
IDC Research Paper Looks at Ensuring and Proving Big Data is Tamper-Free
IDC Research Paper Looks at Ensuring and Proving Big Data is Tamper-FreeIDC Research Paper Looks at Ensuring and Proving Big Data is Tamper-Free
IDC Research Paper Looks at Ensuring and Proving Big Data is Tamper-Free
 
Blockchains Impact on Identity Management.pdf
Blockchains Impact on Identity Management.pdfBlockchains Impact on Identity Management.pdf
Blockchains Impact on Identity Management.pdf
 
Truzzt box 3.2-en
Truzzt box 3.2-enTruzzt box 3.2-en
Truzzt box 3.2-en
 

More from Eleanor McHugh

[2023] Putting the R! in R&D.pdf
[2023] Putting the R! in R&D.pdf[2023] Putting the R! in R&D.pdf
[2023] Putting the R! in R&D.pdf
Eleanor McHugh
 
Generics, Reflection, and Efficient Collections
Generics, Reflection, and Efficient CollectionsGenerics, Reflection, and Efficient Collections
Generics, Reflection, and Efficient Collections
Eleanor McHugh
 
The Relevance of Liveness - Biometrics and Data Integrity
The Relevance of Liveness - Biometrics and Data IntegrityThe Relevance of Liveness - Biometrics and Data Integrity
The Relevance of Liveness - Biometrics and Data Integrity
Eleanor McHugh
 
The Browser Environment - A Systems Programmer's Perspective [sinatra edition]
The Browser Environment - A Systems Programmer's Perspective [sinatra edition]The Browser Environment - A Systems Programmer's Perspective [sinatra edition]
The Browser Environment - A Systems Programmer's Perspective [sinatra edition]
Eleanor McHugh
 
The Browser Environment - A Systems Programmer's Perspective
The Browser Environment - A Systems Programmer's PerspectiveThe Browser Environment - A Systems Programmer's Perspective
The Browser Environment - A Systems Programmer's Perspective
Eleanor McHugh
 
Go for the paranoid network programmer, 3rd edition
Go for the paranoid network programmer, 3rd editionGo for the paranoid network programmer, 3rd edition
Go for the paranoid network programmer, 3rd edition
Eleanor McHugh
 
An introduction to functional programming with Go [redux]
An introduction to functional programming with Go [redux]An introduction to functional programming with Go [redux]
An introduction to functional programming with Go [redux]
Eleanor McHugh
 
An introduction to functional programming with go
An introduction to functional programming with goAn introduction to functional programming with go
An introduction to functional programming with go
Eleanor McHugh
 
Implementing virtual machines in go & c 2018 redux
Implementing virtual machines in go & c 2018 reduxImplementing virtual machines in go & c 2018 redux
Implementing virtual machines in go & c 2018 redux
Eleanor McHugh
 
Don't ask, don't tell the virtues of privacy by design
Don't ask, don't tell   the virtues of privacy by designDon't ask, don't tell   the virtues of privacy by design
Don't ask, don't tell the virtues of privacy by design
Eleanor McHugh
 
Going Loopy - Adventures in Iteration with Google Go
Going Loopy - Adventures in Iteration with Google GoGoing Loopy - Adventures in Iteration with Google Go
Going Loopy - Adventures in Iteration with Google Go
Eleanor McHugh
 
Distributed Ledgers: Anonymity & Immutability at Scale
Distributed Ledgers: Anonymity & Immutability at ScaleDistributed Ledgers: Anonymity & Immutability at Scale
Distributed Ledgers: Anonymity & Immutability at Scale
Eleanor McHugh
 
Hello Go
Hello GoHello Go
Hello Go
Eleanor McHugh
 
Go for the paranoid network programmer, 2nd edition
Go for the paranoid network programmer, 2nd editionGo for the paranoid network programmer, 2nd edition
Go for the paranoid network programmer, 2nd edition
Eleanor McHugh
 
Going Loopy: Adventures in Iteration with Go
Going Loopy: Adventures in Iteration with GoGoing Loopy: Adventures in Iteration with Go
Going Loopy: Adventures in Iteration with Go
Eleanor McHugh
 
Finding a useful outlet for my many Adventures in go
Finding a useful outlet for my many Adventures in goFinding a useful outlet for my many Adventures in go
Finding a useful outlet for my many Adventures in go
Eleanor McHugh
 
Implementing Virtual Machines in Go & C
Implementing Virtual Machines in Go & CImplementing Virtual Machines in Go & C
Implementing Virtual Machines in Go & C
Eleanor McHugh
 
Implementing Virtual Machines in Ruby & C
Implementing Virtual Machines in Ruby & CImplementing Virtual Machines in Ruby & C
Implementing Virtual Machines in Ruby & C
Eleanor McHugh
 
Implementing Software Machines in C and Go
Implementing Software Machines in C and GoImplementing Software Machines in C and Go
Implementing Software Machines in C and Go
Eleanor McHugh
 
Implementing Software Machines in Go and C
Implementing Software Machines in Go and CImplementing Software Machines in Go and C
Implementing Software Machines in Go and C
Eleanor McHugh
 

More from Eleanor McHugh (20)

[2023] Putting the R! in R&D.pdf
[2023] Putting the R! in R&D.pdf[2023] Putting the R! in R&D.pdf
[2023] Putting the R! in R&D.pdf
 
Generics, Reflection, and Efficient Collections
Generics, Reflection, and Efficient CollectionsGenerics, Reflection, and Efficient Collections
Generics, Reflection, and Efficient Collections
 
The Relevance of Liveness - Biometrics and Data Integrity
The Relevance of Liveness - Biometrics and Data IntegrityThe Relevance of Liveness - Biometrics and Data Integrity
The Relevance of Liveness - Biometrics and Data Integrity
 
The Browser Environment - A Systems Programmer's Perspective [sinatra edition]
The Browser Environment - A Systems Programmer's Perspective [sinatra edition]The Browser Environment - A Systems Programmer's Perspective [sinatra edition]
The Browser Environment - A Systems Programmer's Perspective [sinatra edition]
 
The Browser Environment - A Systems Programmer's Perspective
The Browser Environment - A Systems Programmer's PerspectiveThe Browser Environment - A Systems Programmer's Perspective
The Browser Environment - A Systems Programmer's Perspective
 
Go for the paranoid network programmer, 3rd edition
Go for the paranoid network programmer, 3rd editionGo for the paranoid network programmer, 3rd edition
Go for the paranoid network programmer, 3rd edition
 
An introduction to functional programming with Go [redux]
An introduction to functional programming with Go [redux]An introduction to functional programming with Go [redux]
An introduction to functional programming with Go [redux]
 
An introduction to functional programming with go
An introduction to functional programming with goAn introduction to functional programming with go
An introduction to functional programming with go
 
Implementing virtual machines in go & c 2018 redux
Implementing virtual machines in go & c 2018 reduxImplementing virtual machines in go & c 2018 redux
Implementing virtual machines in go & c 2018 redux
 
Don't ask, don't tell the virtues of privacy by design
Don't ask, don't tell   the virtues of privacy by designDon't ask, don't tell   the virtues of privacy by design
Don't ask, don't tell the virtues of privacy by design
 
Going Loopy - Adventures in Iteration with Google Go
Going Loopy - Adventures in Iteration with Google GoGoing Loopy - Adventures in Iteration with Google Go
Going Loopy - Adventures in Iteration with Google Go
 
Distributed Ledgers: Anonymity & Immutability at Scale
Distributed Ledgers: Anonymity & Immutability at ScaleDistributed Ledgers: Anonymity & Immutability at Scale
Distributed Ledgers: Anonymity & Immutability at Scale
 
Hello Go
Hello GoHello Go
Hello Go
 
Go for the paranoid network programmer, 2nd edition
Go for the paranoid network programmer, 2nd editionGo for the paranoid network programmer, 2nd edition
Go for the paranoid network programmer, 2nd edition
 
Going Loopy: Adventures in Iteration with Go
Going Loopy: Adventures in Iteration with GoGoing Loopy: Adventures in Iteration with Go
Going Loopy: Adventures in Iteration with Go
 
Finding a useful outlet for my many Adventures in go
Finding a useful outlet for my many Adventures in goFinding a useful outlet for my many Adventures in go
Finding a useful outlet for my many Adventures in go
 
Implementing Virtual Machines in Go & C
Implementing Virtual Machines in Go & CImplementing Virtual Machines in Go & C
Implementing Virtual Machines in Go & C
 
Implementing Virtual Machines in Ruby & C
Implementing Virtual Machines in Ruby & CImplementing Virtual Machines in Ruby & C
Implementing Virtual Machines in Ruby & C
 
Implementing Software Machines in C and Go
Implementing Software Machines in C and GoImplementing Software Machines in C and Go
Implementing Software Machines in C and Go
 
Implementing Software Machines in Go and C
Implementing Software Machines in Go and CImplementing Software Machines in Go and C
Implementing Software Machines in Go and C
 

Recently uploaded

This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 

Recently uploaded (20)

This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 

Identity & trust in Monitored Spaces

  • 1. IDENTITY & TRUST IN MONITORED SPACES THE VIRTUES OF PRIVACY BY DESIGN Eleanor McHugh Romek Szczesniak
  • 2. Cryptographer Security Architect Physicist Transport Architecture 1998 PKI elliptic curves satellite PSN 1999 π-calculus VM 2000 control networks 2001 mobile identity secure documents 2003 ENUM 2006 dotTel hybrid encryption 2007 encrypted DNS 2010 concurrent VM 2011 national eID 2012 encrypted SQL privacy by design 2014 uPass 2018 Redbush Agora
  • 3. PRIVACY AND SECURITY ➤ digital data is easily duplicated ➤ when data moves or is stored it generates metadata which is itself digital data ➤ processing data or metadata can reveal identity even if any personally identifying data it contains is encrypted ➤ so a system which respects privacy needs to know as little as practical about ➤ the data it processes ➤ the metadata it produces fraud and even household names have fallen foul to criminal hackers. In response to the public outcry ambitious regulations have been introduced such as the European Union’s GDPR and Whenever your org personal data you consent from its su guardian and you by demand
  • 4.
  • 5. UK LEGAL IDENTITY ➤ birth certificate and gender recognition certificate are the primary identity documents ➤ with either it's possible to get ➤ national insurance number ➤ NHS medical card ➤ passport ➤ name can be changed with a deed poll or a statutory declaration ➤ none of these documents include biometrics
  • 6. ATTRIBUTES ➤ attributes are discrete facts ➤ dark hair ➤ wears black ➤ professional cryptographer ➤ fragments of an identity ➤ they may be entirely absent ➤ or some may be imprecise ➤ even a complete set may not be unique ➤ they're only as trustworthy as their origins
  • 13. “What’s in a name? That which we call a rose, by any other name would smell as sweet.” William Shakespeare
  • 14. SECURE TOKENS ➤ tokens alone are not proofs of the identity of their bearer ➤ a biometric needs to be captured to associate a token with an identifiable human being ➤ and the biometric must be confirmed by a person or an algorithmic process at the time identity is being asserted to perform an identification ➤ evidence that this has occurred should be recorded if this needs to be confirmed at a later date such as in a court of law
  • 15. BIOMETRICS ➤ if it can be measured and tends towards uniqueness… ➤ faces ➤ fingerprints ➤ iris patterns ➤ retina patterns ➤ genetic fingerprints ➤ electrocardiogram ➤ electroencephalogram ➤ it can also be duplicated and counterfeited!
  • 16. ID CARD ➤ photo for visual comparison ➤ hologram to assert validity ➤ date of birth reveals age ➤ serial number allows this card to be recorded and tracked ➤ physical security features increase the cost of counterfeiting ➤ smart card features allow a card to be used with digital scanners ➤ but how much scrutiny will be applied when the card is used?
  • 17. LIVENESS ➤ digital data is easily copied ➤ replay attacks repeat a previously captured biometric ➤ spoofing creates a facsimile of a biometric capable of fooling a digital system ➤ proofs ➤ is data being captured now ➤ is it from a genuine source ➤ has it been tampered with ➤ is it likely to be unique
  • 18. TRUST ARBITRATION ➤ a contract is an agreement to do something between two parties ➤ in Common Law this requires both intent and an exchange of consideration ➤ a contract can be enforced by the courts even if it has no written form ➤ trust relies on recognised authority and transparency of process ➤ the internet has no courts and machines lack intent so we must provide witnesses that a human decision was made and rely on off-line courts to resolve disputes
  • 19. CHECKING IDENTITY ➤ each exchange of identity comes with proof that the exchange occurred ➤ proof engenders trust ➤ we anchor trust in information based on its provenance and its tamper-resistance ➤ we can also capture proof of why the exchange occurred ➤ we can record these proofs for future reference ➤ good bookkeeping is at the heart of all identity schemes
  • 20. THE CRYPTO TOOLBAG ➤ HMAC hashes are large numbers computed from a set of data with cryptography ➤ any change to the set of data will result in a different HMAC value being calculated ➤ symmetric encryption allows two parties with the same key to communicate securely ➤ public key encryption keeps the decryption key secret ➤ hybrid encryption allows a symmetric key to be shared as data by encrypting it with a public key
  • 21. UNIQUENESS ➤ a one-time pad is a single use key for encrypting a message ➤ it provides a unique mapping between the encrypted content and the keys to generate and recover that content ➤ it provides perfect secrecy as there are no variant encrypted texts which can reveal elements of the keys ➤ one-time pads require key management which guarantees uniqueness and randomness
  • 22. IMMUTABILITY ➤ singly-linked lists are a popular abstraction in computer science ➤ they allow several lists to share common starting segments ➤ a hash chain extends this concept with computed hashes for each element and an optional signature to validate them ➤ alter one item in the chain and all subsequent hashes must be recalculated for the signature to remain valid
  • 23. INTEGRITY ➤ trees are another popular data structure related to lists but used to capture hierarchical structures and optimise search ➤ Merkle trees are trees built from hash chains ➤ adding to the tree creates a new root element whose hash proves the integrity of its links and leaf elements ➤ building many overlapping trees ensures that changes to one tree will invalidate other trees
  • 24. BLOCKCHAIN ➤ Bitcoin uses a hash chain of Merkle trees packaged as blocks of information to provide nonrepudiation ➤ the hash chain can be forked deliberately or as a result of network partitioning ➤ the Bitcoin consensus algorithm is based on proof of work which limits the rate at which transactions can be performed ➤ and if forks are later merged together then the shorter fork is discarded ➤ forks can overcome this by using sidechains for exchange
  • 25. ROUTING ➤ the internet comprises a decentralised physical infrastructure ➤ most applications are built with a centralised client-server model which hides this reality ➤ servers act as trust anchors ➤ blockchain mining & etherium dApps are fully distributed ➤ lacking servers they require a consensus algorithm to agree a trusted reality
  • 26. CASE STUDY: DESIGNING UPASS patented by Yoti Ltd, 130 Fenchurch Street, London
  • 27. PRINCIPLES ➤ UK common law identity ➤ functional anonymity ➤ resistant to mass surveillance ➤ a reliable source of information even if the information itself is unreliable ➤ transactions are fast with minimal need for consensus or protocol handshakes ➤ can be scaled to a global system ➤ works on desktop, mobile & IoT platforms
  • 28. OVERVIEW ➤ an anchor document underlies each identity ➤ mobile-centric design ➤ everything happens on the handset ➤ QR codes for easy token sharing ➤ validation service ➤ check tokens ➤ release information ➤ secure store is an encrypted datastore ➤ one-directional flows share trust between all three actors
  • 29. REGISTRATION ➤ digitise anchor document ➤ capture selfie ➤ create profiles ➤ anonymous ➤ date of birth ➤ name ➤ nationality ➤ generate encryption keys ➤ record phone address ➤ issue anonymous profile credential
  • 30. TRANSACTIONS ➤ a customer presents a profile credential to a merchant ➤ the merchant adds a credential of their own ➤ both credentials are sent to validation server ➤ the validation server confirms the credentials are known to it ➤ it invalidates these and sends receipts directly to both customer and merchant ➤ the receipts provide fresh credentials ➤ only the server ➤ knows the delivery addresses ➤ can make fresh credentials
  • 31. PROFILES ➤ a set of keys and their associated values ➤ essentially a web form ➤ anchored to a document or assigned by another profile ➤ has a confidence value based on its provenance and usage ➤ is immutable and links to previous versions of itself ➤ has an associated selfie chain with photos of its owner ➤ anonymity is represented by a profile containing no keys or values
  • 32. CONFIDENCE ➤ courts reach a verdict by judging the relative credibility of evidence & witnesses ➤ a distributed ledger which is very difficult to tamper with provides a powerful witness ➤ and each anchor document is a witness of the profile data depending on it ➤ a profile's associated selfie can be inspected by its recipient at the time the transaction takes place and compared with the presenter's face ➤ combined with a confidence value this provides a reasonable basis for making informed choices
  • 33. RECEIPTS ➤ receipts come in pairs ➤ each receipt has links to the relevant information about the other party ➤ links are included to the profile presented and to any profiles previously assigned by the recipient ➤ receipts are encrypted with a symmetric key specific to the profile used by the recipient ➤ and they contain a shared key which is unique to this transaction ➤ each receipt contains a link to the previous transaction performed by this profile
  • 34. MASTER RECEIPTS ➤ receipt pairs are recorded opaquely as master receipts in the secure store ➤ a master receipt is encrypted with the shared transaction key ➤ the transaction key is never recorded in the secure store ➤ master receipts form a chain ➤ the index for this chain is calculated from the credentials used but these are only stored in the receipt pair
  • 35. FACE RECOGNITION ➤ the human brain is generally good at looking for and identifying faces ➤ machines can be taught to match faces by reducing them to a templated form ➤ this templated form can act as an index to return one associated identity among many ➤ or it can be associated with a particular profile and used to confirm identity ➤ each source image for the template and their order are recorded in a blockchain ➤ this allows the template to be recalculated for any point in a profile's history
  • 36. BIOMETRIC LIVENESS ➤ to be practical a biometric should be simple to capture & tamper resistant ➤ it should also have a differential property which can be used to test it's live ➤ pupillary response to a succession of bright flashes of light has calculable properties ➤ and eye movement may be guided using a shared cryptographic secret which will be unique to a particular device ➤ the server sets the parameters randomly for each test making the results unique to this particular interaction FIG. 5D time Pupillary area Constriction δt first pulse applied second pulse applied t1 t2 FIG. 4 D SF_t SF_(t_n) W FIG. 8 W W FIG. 9 W FIG. 8 W W 120c y x Liveness Eye tracking Enrolment b S1104b S1112 S1110b Cv Cv’ ET params PD results + sig+URI ET results + sig+URI Access control 214
  • 37. 104 120a 120b 120c δt time Pupillary area y x Pupil dilation Liveness Eye tracking Enrolment FIG. 11 S1102a S1102b S1104a S1104b S1106 S1108a S1108b S1112 S1110a S1110b 130 Cv Cv’ PD params ET params Collect liveness detection data S1107 1102a 1102b PD results PD+ET sig ET results PD+ET sig PD+ET params +PD and ET server URIs 1101 PD results + sig+URI ET results + sig+URI Access control 214 DEVICE LIVENESS ➤ live biometric responses with random parameters give us unique values ➤ by controlling where and how these are delivered we can prove uniqueness of our current interaction ➤ as a result we can prove the device is live ➤ as with a transaction we use one-way messaging which can reduce the ability of an eavesdropper to apply flow analysis
  • 38. WEB CONNECT+ ➤ sometimes we need to perform transactions via an untrusted intermediary ➤ These are potentially subject to Man-in-the- Middle attacks ➤ by having a remote server use our device as a validator we can perform a transaction and give them access to a secure back channel ➤ now we can monitor & control their connection to our untrusted intermediary ➤ Essentially the remote site has to login to our local system
  • 39. ASSET TRACKING ➤ the building blocks of uPass can provide identity to things as well as people ➤ we can use this fact to create private identity spaces unique to a particular asset class such as event tickets ➤ this can be used to control how the asset changes hands