[OpenID] "This is user's URI" for Assertion Quality Extension

SitG Admin sysadmin at shadowsinthegarden.com
Sat Sep 6 02:39:22 UTC 2008


>So the RP would end up exactly the same identifier an RP would dicover if I
>logged in as =drummond.

I could keep track of which you entered, though this isn't covered 
from within the spec. But this isn't very useful past OpenID v1.

>That's the way directed identity is designed to work. It's not necessarily
>about anonymity -- it's about letting the user choose their URI at the OP

That it *can* be used for anonymity is sufficient reason to begin 
accounting for that usage in advance.

>It can and should be the user's choice what URIs
>he/she shares with what sites.

Choice is more like chaos without some knowledge to inform it. Being 
able to detect what the user is doing and advise them of what that 
*means* is akin to error reporting; it would be nice if OP's were 
responsible for all of this, but we shouldn't rely on all OP's 
sharing the same view of what qualifies as erroneous - nor can we 
rely on them to inform RP's of user's choices when those RP's might 
offer contradictory advice. When it comes to information warfare, I 
prefer full and pre-emptive disclosure, but the challenge here is 
getting information to the users when they won't go looking because 
they know what they were told is right.

General principles aside, a RP should be able to inform a user *in 
advance* of things like "If, later on, we see the URI you are using 
here, but on some other site, we will raise the value of your 
Identity accordingly, and grant you higher privileges on our site . . 
. now, here are the consequences *we think* you should be aware of, 
to doing so." - whatever is specific to that RP, instead of expecting 
OP's to anticipate and keep track of everything so they can apprise 
the user of the implications of their (the user's) decisions.

>If a site has a particular reason to know
>that a user has shared a particular URI with another particular site, that's
>different -- and the OpenID protocol could be used to prove that. But I
>don't think that's what you're asking.

True, this is more of a pre-emptive question:

>Obvious use case would be that psudonimous user wanting to be
>recognized as the same person as the previous visit but not willing to
>give up his privacy. Thisbis a classic use case in both XRI and Liberty.
>
>=nat at Tokyo via iPhone

I was a bit confused at first, thinking "This is what we have 
already, not knowing if the user is 'anonymous' but being able to 
identify them from session to session.", and then I realized the 
application for pro-privacy^1 sites: being able to detect that a user 
has an identifier which *could* be used, in the future, on other 
sites - and warning them "If this site's records are compromised, 
your main URI would be too, so we recommend you to use an anonymous 
URI here and preserve your main URI for sites where you want that and 
others to know you by the same digital identity."

Whereas, with a URI that isn't found on Google (yet), how could a RP 
know whether it was seeing a unique URI that would only be used for 
that RP, or a "real" URI that might later show up on other sites?

^1) As a pro-privacy site, I would probably alternate between 
recommending new users to be anonymous and recommending them not to 
be. Or both at the same time: "I tried entering my claimed_id and you 
said it was safer to be anonymous, so I tried being anonymous and you 
said that typing in my claimed_id would be better. Make up your mind!"

-Shade

Postscript: it might be helpful if I referenced Andrew Arnott's 
message (on the general list) that inspired this?
http://openid.net/pipermail/general/2008-September/005453.html



More information about the general mailing list