German Hackers publish Fingerprint of Interior Minister Schäuble

thoughts and observations of a privacy, security and internet researcher, activist, and policy advisor
As I wrote in my last post: "The identity management systems that are being developed and rolled out right now are laying the foundations that may be used to end online anonymity." This is becoming especially relevant with the development of e-government identification tokens that are issued by more and more governments around the world. I consciously said "may", because a cruicial question is how the systems are designed.
TrustBearer Labs, a leading authentication solutions company, has announced support for the Finnish National Electronic Identification Card (FINEID) with its OpenID service. With this support, the FINEID smart card can now be paired with the OpenID online authentication standard, enabling FINEID cardholders to use their cards for logging in to any website that accepts OpenID. (...)As far as I can tell from the press release and the little background info, it only works with an OpenID provided and managed by TrustBearer themselves.
The Citizen Certificate is standardized personal data, an electronic identity based on Public Key Infrastructure. It contains, among other information, a citizen’s first name, family name and an electronic client identifier.The legislators in Kentucky who want to force everybody to use his or her real name for even the smallest online publications will be happy if they see this. The TrustBearer press release praises it:
"We believe that our OpenID service complements national identification programs, like Finland’s ID card. National ID card holders can now securely and efficiently manage many of the things they do on the Internet using a central and secure identity," says David Corcoran, Chief Executive Officer of TrustBearer Labs.This is a very dangerous development. We have a technology here that allows the tracking of your online activities (OpenID) combined with a technology that always identifies you with your real, legal persona (FINEID). The only firewall between this and a fully-fledged government surveillance system for online activities is that
Online free speech is increasingly under attack. Not just by classical censorship, but by laws and regulations that would prohibit anonymity and establish mandatory identification systems.
Kentucky Representative Tim Couch filed a bill this week to make anonymous posting online illegal. The bill would require anyone who contributes to a website to register their real name, address and e-mail address with that site. Their full name would be used anytime a comment is posted.Digg alerts its readers that the story was "reported by diggers as possibly inaccurate". Well, it is accurate. Here is the relevant part of the bill:
SECTION 2. A NEW SECTION OF KRS CHAPTER 369 IS CREATED TO READ AS FOLLOWS:What is the reasoning behind it? National security? Preventing online stalking and insults? No - bullying! Local tv station WTVQ reports:
(1) An interactive service provider shall establish, maintain, and enforce a policy to require information content providers to register a legal name, address, and valid electronic mail address as a precondition of using the interactive service.
(2) An interactive service provider shall establish, maintain, and enforce a policy to require information content providers to be conspicuously identified with all information provided by, at a minimum, their registered legal name.
(3) An interactive service provider shall establish reasonable procedures to enable any person to request and obtain disclosure of the legal name, address, and valid electronic mail address of an information content provider who posts false or defamatory information about the person.
SECTION 3. A NEW SECTION OF KRS CHAPTER 369 IS CREATED TO READ AS FOLLOWS:
An interactive service provider that violates any of the provisions of Section 2 of this Act shall be fined five hundred dollars ($500) for the first offense and one thousand dollars ($1,000) for each subsequent offense.
Representative Couch says he filed the bill in hopes of cutting down on online bullying. He says that has especially been a problem in his Eastern Kentucky district.Because Tim Couch gets all the fire now, it is fair to mention that his republican party colleague Jimmy Higdon is co-sponsoring the bill.
The Kentucky bill comes on the heels of controversy over the growing popularity of JuicyCampus.com, a "Web 2.0 website focusing on gossip" where college students post lurid—and often fabricated—tales of fellow students’ sexual encounters. The website bills itself as a home for "anonymous free speech on college campuses," and uses anonymous IP cloaking techniques to shield users’ identities. Backlash against the site has emerged, with Pepperdine’s student government recently voting to ban the site on campus. (...)But there is hope, at least for the moment. WTVQ from Kentucky again:
Despite the appeal of combating defamation by banning online anonymity, lawmakers should be wary about restricting anonymous speech in the name of fighting libel. The same laws designed to deter defamation can also be used to target political dissent or silence whistleblowers for whom the option of remaining anonymous is critical.
Couch says enforcing this bill if it became law would be a challenge.At the moment, he is absolutely right.
Facebook recently had a porn chain letter from Slide, who are running the Facebook "fun wall" application. Mary Hodder explains how it worked:
[I]magine you get some sort of email message from a friend in Facebook. This is a real friend, someone you do business with and/or socialize with and maybe have known for a long time (...). The message asks you to click into Facebook, at which point, you are asked to "install an app" (...). Then, once installed, you are taken to Slide's Fun Wall App, which shows you some porn, and says, "Click Foward to see what happen."(...) Turns out, if i'd clicked the "forward" button, Slide would have forwarded that spam to EVERYONE I KNOW in Facebook. All 500+ of them.This event is interesting from the governance side of social networks: How do you establish and enforce norms in these new environments?
appalled at the responses I got. Now, these are people I know socially, and they gave me the real answers, but with the expectation that I would not attribute to them. However, I am confident that their answers reflect the culture and real value sets within these companies.Somehow, this reminds me of real existing democracy: If you don't get enough people on the streets or as participants in a class action law suit, politicians just won't listen. But apart from democratic considerations, in real government arrangements, you should also have the right to legal redress. Remember, in history, rule of law and democracy were not necessarily connected.Facebook pointed the finger at Slide (the app maker in this case), and said, "There is nothing we can do. We have no control over the apps people make or the stuff they send." Oh, and if I wanted Facebook to change the rules for apps makers? I'd have to get say, 80k of my closest Facebook friends to sign on a petition or group, and then they might look at the way they have allowed porn spam to trick people into forwarding, but until then, there would be no feature review. (...)
Also both companies told me that blogging doesn't affect them, because they don't read blogs. The only thing they pay attention to are Facebook groups. Because they don't look at problems that a single person discovers.
Slide, on the other hand, replied, according to Mary:
Facebook was the problem, because as the "governing" body, Facebook makes the rules and "Slide wouldn't be competitive if they changed what they do, and their competitors weren't forced to as well." In other words, Slides competitors use the same features to get more users (or trick more users as the case may be) and Slide didn't want to lose out on getting more users with similar features, regardless of the effect the features have on us and our relationships.This sounds like real existing free market with a lack of regulatory oversight. For dealing with these kinds of problems, you normally need some authority that does not have a vested interest and at the same time has the power to regulate market failures and externalities. Facebook clearly has the power, as they control the technology and can decide what applications can and cannot do. If you conceive of Facebook as the government of the relationship space, Facebook does not have this division of powers and arms-length agencies governments normally have. And at the same time, as mentioned above, they lack a legal system the would enable individual users to claim their rights.
For now, the answer for me is to use Facebook minimally and Slide not at all. Interestingly, at recent social gatherings I've mentioned these issues. At almost every one, people have said they are getting off Facebook and not going back, for precisely the reasons I mention above.But the voice option also had some effect:
Facebook did recently force apps makers to default turn "off" the checked names in forward (as far as I can tell from my own analysis of Facebook and via other blogs explanations). But I have yet to receive replies to my original support notes to these companies, and feel confused about an unspoken, barely there response. It's as though after barely changing one thing aspect of a feature, in order to mitigate the problem, they want to sweep it all under the rug.Maybe Facebook finally has started reading blogs? Remember, another important feature of modern democracy, beyond the rule of law and the division of power, is the existence of a public sphere.
[I]t seems logical (and has happened in cultures around the world for millennia) that older, wiser men would advise young, clueless hormone driven boys how to act in the community.Which approach would you take?
Microsoft has acquired Montreal-based privacy technology company Credentica. While that probably means nothing to most of you out there, it is one of the most important and promising developments in the digital identity world.
[W]ith managed cards carrying claims asserted by a third party authority, it has so far been impossible, even for CardSpace, to completely avoid artifacts that allow linkage. (...) Though relying parties are not able to collude with one another, if they collude with the identity provider, a set of claims can be linked to a given user even if they contain no obvious linking information.This is related to the digital signatures involved in the claims flows. Kim goes on:
But there is good news. Minimal disclosure technology allows the identity provider to sign the token and proof key in such a way that the user can prove the claims come legitimately from the identity provider without revealing the signature applied by the identity provider.Stefan Brands was among the first to invent technology for minimal disclosure or "zero knowledge" proofs in the early nineties, similar to what David Chaum did with his anonymous digital cash concept. His technology was bought by the privacy firm Zero Knowledge until they ran out of funding and gave it back to Stefan. He has since then built his own company, Credentica, and, together with his colleagues Christian Paquin and Greg Thompson, developed it into a comprehensive middleware product called "U-Prove" that was released a bit more than a year ago. U-Prove works with SAML, Liberty ID-WSF, and Windows CardSpace.
Our goal is that Minimal Disclosure Tokens will become base features of identity platforms and products, leading to the safest possible intenet. I don’t think the point here is ultimately to make a dollar. It’s about building a system of identity that can withstand the ravages that the Internet will unleash. That will be worth billions.Stefan Brands is also really happy:
For starters, the market needs in identity and access management have evolved to a point where technologies for multi-party security and privacy can address real pains. Secondly, there is no industry player around that I believe in as much as Microsoft with regard to its commitment to build security and privacy into IT systems and applications. Add to that Microsoft’s strong presence in many of the target markets for identity and access management, its brain trust, and the fact that Microsoft can influence both the client and server side of applications like no industry player can, and it is easy to see why this is a perfect match.A good overview of other reactions is at Kim's latest blog post. The cruicial issue has, again, been pointed out by Ben Laurie, who quotes the Microsoft Privacy Team's blog:
When this technology is broadly available in Microsoft products (such as Windows Communication Foundation and Windows Cardspace), enterprises, governments, and consumers all stand to benefit from the enhanced security and privacy that it will enable.Ben sarcastically reads it like "the Microsoft we all know and love", implying market domination based on proprietary technology. But the Microsoft we all know in the identity field is not the one we used to know with Passport and other crazy proprietary surveillance stuff. They have released the standards underlying the CardSpace claims exchange under an open specification promise, and Kim assures us that they will have their lawyers sort out the legal issues so anybody can use the technology:
I can guarantee everyone that I have zero intention of hoarding Minimal Disclosure Tokens or turning U-Prove into a proprietary Microsoft technology silo. Like, it’s 2008, right? Give me a break, guys!Well. Given the fact that U-Prove is not just about claims flows, but involves fancy advanced cryptography, they really should do everybody a favour and release the source code and some libraries that contain the algorithm under a free license, and donate the patent to the public domain.
A basic rule of cryptography is to use published, public, algorithms and protocols. This principle was first stated in 1883 by Auguste Kerckhoffs.
The OECD is preparing a ministerial conference on "The Future of the Internet Economy" in Seoul in June. Civil Society groups have been working together for a few months in order to coordinate their input and activities. The executive summary (well, more a shortened version) of our joint statement has just been sent to the OECD secretariat. I happened to draft and revise the chapter on "Identity Management and Reputation", which is copied below. Comments and ideas are more than welcome and may end up in the long version, which will be finished in the next 2 weeks.
The Internet is part of consumers’ and citizens' daily lives and shops, banks, insurance companies and governments expect consumers to contact them online for services, advice, information, online payments and online banking. In an environment of increasing online fraud and identity theft, identity management and authentication is closely linked to security, privacy and consumer confidence online. The challenges posed by effective identity management include ever increasing use of massive consumer database systems and their integration, user profiling, complex relationships between companies and subsidiaries, and cross-border data flows.
Systems for electronic identification and authentication have been in place in a number of countries for a few years now, and the experiences clearly show a strong link between privacy and identity. The failure of large-scale singlesign- on services in the nineties has shown that citizens and customers are only accepting identification technologies and services if they are sure their privacy is respected at the same time.
The 2006 OECD Guidance on Electronic Authentication includes two principles that are particularly important from the consumer perspective: the one of proportionality, and the right of privacy.
While this is a good first step, latest research in online identity management has shown that there are more issues that need to be addressed. Technological development has made significant steps recently that allow for greater security while maintaining individual anonymity. Such systems should be encouraged. Important elements include:
Drama 2.0 has a great guest comment at Mashable on the concept of "data portability", which means that people may be able to take their identity and social graph data from one Web2.0 platform and move it to a new one. There's been a lot of hype around this recently, but he says: "Data portability is boring":
I think the name reveals what’s wrong with the concept: “data.” Yes, data is important, but the data collected by Web 2.0 services isn’t what makes those services compelling- it’s the fact that real people you have some connection to are using them too. I could take my Facebook “data” with me to another Web 2.0 service, but if the friends “contained” within that data aren’t using that service, what’s the point?The great British blues-rock band Ten Years After had a track on their 1979 album "Alvin Lee & Company" which was called "Portable People":
Obviously, data portability goes beyond simple lists of friends, but in the context of consumer Web 2.0 services, I think technologists who now consider the addition of “social” features to existing applications to be innovation ironically overlook the fact that data and technology don’t drive the popularity of Web 2.0 services – people do.
Without active, engaged and passionate users who perceive some value in using the Internet as a platform for social interaction, a Web 2.0 service probably isn’t going anywhere, regardless of data portability.
See them at the airport with their cases in their handThe cases, airports and super-sonic jets nicely illustrate how much effort people take in order to work with or meet other people. Real people, not their de-contextualized data representations.
Got a ten day package in another land
They're the jet age gypsies with a super-sonic sound
They're the portable people, and they take themselves around