[OpenID] The OpenID Foundation Launches the OpenID Connect Standard
SitG Admin
sysadmin at shadowsinthegarden.com
Sun Mar 2 00:54:59 UTC 2014
>the hard core folks selling hardened KMIP-powered crypto boxes (with
>"assured" random number generators and "suspiciously-secure
>channels" between keying-command box and keying-using server cards)
>seemed to like the way OAUTH and openid connect is going, generally.
I like the idea of backing authentication with widely-disseminated
*trustworthy* hardware (this was one of the reasons I doubted the
"Dark Mail Alliance"; Forbes said keys would be assigned to each user
*and populate[d] across their devices* - right where they can too
easily be stolen), but can we trust that these boxes haven't been
strategically weakened for easy of future compromise, monetizing
users when the inevitable government requests come for keys?
(Requests plural, because of governments plural; recoup manufacturing
costs from users, then sell key groups like E-mail addresses to
spammers: this group belongs to people who travel internationally,
you can use it without admitting to having agents in their country to
spy on another nation's citizens.) I wonder if they'll open-source
their designs, like Locksport did (enraging *that* industry), letting
users select who *they* trust to build the hardware (and flash the
firmware) to spec, and finding another way to profit.
>In the cloud era, it is ALL proliferating crypto-enabled *hardware*
>, that needs CENTRALIZED management to address compromise readiness
>and rapid purging of broken keys - a service to be delivered by a
>small number of ultra trusted points of presence produced a small
>number of very "trusted" vendors.
Yes, centralized-points-of-failure (oops - I mean "centralized points
of TRUST") are still compatible with "management as a SERVICE"; a
patent (on published designs) might work to keep competitors out of
that field for a while (after all, if Android and other "open-source"
operating systems can justify locking their "open" systems to
"proprietary" driver (or application) modules, leaving the system
useless on anything but pre-approved hardware and the pieces
difficult to use elsewhere, then surely RSA vendors can pirate the
strategy from Google et al?). I've been disappointed at the
federation of OpenID (and strong shift away from independently
asserting/consuming "Identities"), but perhaps post-PRISM user
annoyance (combined with the availability of "trusted" devices, if
this at least can also be decentralized to not discourage users from
trusting those very few vendors) will reboot OpenID's potential as an
already-existing technology that promises user-centric trust and is
compatible with the internet we have *now* (no disrespect to the
crypto-anarchists building Web 3.0 as a replacement for the
incrementally-upgraded antique we have today).
-Shade
Postscript: I defaulted to the "SitG Admin" handle for mail clients
that show "sysadmin at s..." (fairly useless for unique
identification!), and after trying "Shade" in its place decided to
undo the change since it looked too much like a "real name". I later
kept it this way to be consistent, but have been considering the
off-putting effects it might have, and so I thought about switching
to "Shade" - it would be pointless though if I wasn't going to
participate more (which seemed likely with the focus on federation
in/of OpenID), so I didn't need to do anything (lack of posts would
have the same null-effect). Since this is another substantial post,
though, I'm postscripting the switch. Long-time subscribers here
should be able to recognize it with little confusion; hopefully that,
and this one-time notice, will minimize disruption. (I also plan to
explicitly use "Shade (pseudonym)" or similar to discourage the
real-name assumption.)
More information about the general
mailing list