Replies: 2 comments 5 replies
-
My first thought here is that there is an implicit dynamic of trust that happens with key management. If you are really bad at managing your keys, nobody will trust you. The problem actually solves itself by virtue of the aligned incentive that people and orgs want to be trusted and additionally reputation networks will become more prominent probably. Manage your keys bad and nobody will trusts you ( which most people don't want). Your trust reputation declines. And for critical services (like government), trust is everything, so key management is a critical part for them. They are incentivized to manage their keys correctly (like everyone else) I've had a conversation with someone else that was really interested in trust reputation, and we discussed how there's actually more overlap than obvious think between the trust registry work and trust reputation systems, which btw: means that we need to be cognizant of aligning future efforts of trust reputation networks with this. For a security persona though, an implicit reputation system may not be satisfying, even if it's actually relatively similar to how the real world works. So, there are other ways you can give more "explicit" key management attestation that might be more satisfying. You can of course, have additional context layers of attestation, (like an authority that audits your key management, or even manages them ) but, I do not believe this is not a "strict requirement". It may be required for some use cases, but the requirements for key management attestation probably changes with the impact of the service. Context really matters here. As time moves on, maybe a common practice in a credential exchange is to attest which software is powering your key management, (i.e powered by hyperledger). As a verifier, I have a choice of not accepting software that isn't powered by a provider I trust, and that's completely reasonable (oh, you're powered by "mufu software? I don't trust that software, so I don't trust you ) I think this question however, needs to be continued to expanded out and a really thoughtful response needs to be given, as these are security professionals, and they will want every i dotted and every t crossed (rightly so). I of course, can wing a response, like the above, but that will probably not satisfy most security personas (even if for some reason, I am right ) As far as the definition of trust: |
Beta Was this translation helpful? Give feedback.
-
It's fascinating to watch, in the early days of nostr, everyone losing/exposing and burning their keys. Even the most experienced users are lousy at key management. What quickly fell into place was the nostr naming service (NIP-05) that enables you to keep your nostr handle, if you lose your keys. After looking at nostr NIP-05, it is doing exactly what DIDs do. You have to place some trust in the the "did method" that there is sufficient key management capability, including key rotation, key recovery, etc. Which did methods facilitate the best, will be the ones that people trust, without needing to get into the specifics of key management. So in the end, it's about which did method to rely on, not the actual key management (which is taken care of, by extension, the reputation of the did method). What seems to be adopting quickly is did:web, because people are already familiar with dns and make the assumption that if you can manage your website, the keys emanating from that site should be ok. |
Beta Was this translation helpful? Give feedback.
-
I had a conversation with someone over Linkedin, and his primary concern was that you don't know how someone is managing their keys. While this is probably out of scope for the specification work done here, it is also a reasonable question w.r.t a "trust use case" and how this would work, specifically w.r.t the security persona.
I don't think this lands up in the specs themselves, but I do think having a solid answer to this question would address the "security" persona of the we've landed on as one of the key personas of the work done here.
I have attached some of the dialogue below:
This could be part of the companion guide IMO. It's such a critical question for the advancement of the space, even if it's slightly adjacent, I think it needs to be reasonably addressed somewhere, with a concerted and aligned position from the decentralized trust community.
Beta Was this translation helpful? Give feedback.
All reactions