Return-Path: <wayne@spruceid.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by ietfa.amsl.com (Postfix) with ESMTP id DDC4AC14F6A3
	for <oauth@ietfa.amsl.com>; Tue, 24 Dec 2024 18:48:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level: 
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5
	tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
	DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_FONT_FACE_BAD=0.001,
	HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001,
	T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001,
	URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001]
	autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key)
	header.d=spruceid.com
Received: from mail.ietf.org ([50.223.129.194])
	by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id l9o1xB_1-Lun for <oauth@ietfa.amsl.com>;
	Tue, 24 Dec 2024 18:48:37 -0800 (PST)
Received: from mail-lf1-x132.google.com (mail-lf1-x132.google.com
 [IPv6:2a00:1450:4864:20::132])
	(using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)
	 key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256)
	(No client certificate requested)
	by ietfa.amsl.com (Postfix) with ESMTPS id D3F6CC14F6A0
	for <oauth@ietf.org>; Tue, 24 Dec 2024 18:48:36 -0800 (PST)
Received: by mail-lf1-x132.google.com with SMTP id
 2adb3069b0e04-53e3a5fa6aaso7326463e87.0
        for <oauth@ietf.org>; Tue, 24 Dec 2024 18:48:36 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=spruceid.com; s=google; t=1735094915; x=1735699715; darn=ietf.org;
        h=cc:to:subject:message-id:date:from:in-reply-to:references
         :mime-version:from:to:cc:subject:date:message-id:reply-to;
        bh=A3Z/8Z2AsDDKFX00kK8FmKVD7hkpmsS2hNyKxyJeUI4=;
        b=BtnDlPs/7cxc1+EPHN5vZ0s1ud9HD38Z8d+ffhO8eXlblqUNBT5nNCD0L9wkoCWrmE
         YNmt9o0yGCC0vBHPUiMDedxqPyzsVkv+Lhd5uFPxTpz/KbpPrFk+xR86DVzczsiVqjNg
         isgklWxc58ZRCWOh8s041YC23DPrY2cpeSo/o9wFe0A1O7b6IT1QXjmuxasICaV6XTZZ
         z8L7wrLM3mH4sE0GCkDMV/oEd/yIzUy33pzYuaFDi1mFOHKwO+vVQlSFZrGvNROXQK2H
         nGEEcmhZUb1cFMTxBgtkp2+NkdLzpn4ZqQ12VBGPBGuBOTeSM1l+uTPfpJs81EYX5Z2G
         7p0w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20230601; t=1735094915; x=1735699715;
        h=cc:to:subject:message-id:date:from:in-reply-to:references
         :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id
         :reply-to;
        bh=A3Z/8Z2AsDDKFX00kK8FmKVD7hkpmsS2hNyKxyJeUI4=;
        b=DHB15wWYaMJgpnDvQcwzbwGIf2FIRA5WHhsqi40qTJZzMoLjZYe+FPTiZGp6PlSQVC
         oto4cZI2W8ue2N56U/lbQcAob6QZBzt1WrXxK9R7Qwt+nEjbcC6VA6pUikLr8tWNNvJD
         yyjLJJe+jUZCxvayCb+Obmumw+ClsOFk9ni4zOKaOSSBrSQwZCCKHnkIFC9Kf4NPxuza
         IufHTCNd0KKDYNgsiaRRakKbQO5sTr1PzGXIuktVr57sbimdxkOFp4P4Mn0EfRZLUmMl
         ez2P95mdLjw9oX9wQxrd0rcz8s5NtI2NJDbalYyS+riiBgZ0gIKqcjrhHTgVZdxY91Q1
         ktag==
X-Forwarded-Encrypted: i=1;
 AJvYcCUqb7TqCn/PocC6wx8YSYyI+vfH2k0axo6h7ifldWlp5791vtFpWPPul1aX8r/5QCjreyuFyg==@ietf.org
X-Gm-Message-State: AOJu0YwHCE1uUAnjF7wWzKmGI6azD6ZqGAHxc4t0XcltXEoGQUjpAvJz
	Uw2oA9q8eKU+bWDMzzcAwQMeXNMt8DoiP9mgrZuo8JXkM00kpnuIwTu7pu5NDLSBVjiOaQZlOMI
	MX+OFZReGJCxE4a66soiv9wLsc6usKepdsMlPHw==
X-Gm-Gg: ASbGncvXTvlYeE4lUSx5qHDYnoJKmtEZASgohHSwQdbfGaVJkCDmgJZZiGCUUzbql0t
	iMo78Ke+UndXCt+bcalj0yt6gFvUn+C6t/ZZJTw==
X-Google-Smtp-Source: 
 AGHT+IFfGj1369T9XaRT3mi6pJbhTPRf19PybD87IuYGW3OnhbZuIm2OmT61PjPkLRu913P0zmlO0AeFc4XFyIJEbEA=
X-Received: by 2002:a05:6512:23a2:b0:542:1bdb:9a61 with SMTP id
 2adb3069b0e04-5422946f053mr5618614e87.19.1735094915053; Tue, 24 Dec 2024
 18:48:35 -0800 (PST)
MIME-Version: 1.0
References: 
 <CACsn0cnEJKamSSJH4-pKg1xNZ3X+__B4UwZ3P5enxP5tQ4AqzA@mail.gmail.com>
 <CAK2Cwb4L-KTkK96CJNwpZNiYiyMQSyH35MHNnOLEiWW+_FojZQ@mail.gmail.com>
 <CAFTzAXjq8AhZKKM5LC7ykFqTUAHJUD70kscrpLH-MaUFfiv_Hg@mail.gmail.com>
 <CAK2Cwb6Ajud45wQWvF5zDoxZSAQ2Hio55vz-rRHy=OGSvx=eXQ@mail.gmail.com>
 <CAFTzAXh68jH64_Pry1koyU6j-m03_kQo_Y6qfJ9BtCJVGdvWYQ@mail.gmail.com>
 <CAK2Cwb77n5tBh=+VD3CM4evzExDHnpdDQHQQpk7HNCcR5x8q4A@mail.gmail.com>
In-Reply-To: 
 <CAK2Cwb77n5tBh=+VD3CM4evzExDHnpdDQHQQpk7HNCcR5x8q4A@mail.gmail.com>
From: Wayne Chang <wayne@spruceid.com>
Date: Wed, 25 Dec 2024 10:48:19 +0800
Message-ID: 
 <CAFTzAXhNNNE3UyZhHN5CJYkE9qBNgoC_XRyuQ9286YRTiWf8KA@mail.gmail.com>
To: peace@acm.org
Content-Type: multipart/alternative; boundary="000000000000105593062a0f4425"
Message-ID-Hash: KSXFPYS2LJU77QWXYZD2W4ZDELD7PTCD
X-Message-ID-Hash: KSXFPYS2LJU77QWXYZD2W4ZDELD7PTCD
X-MailFrom: wayne@spruceid.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency;
 loop; banned-address; member-moderation; header-match-oauth.ietf.org-0;
 nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size;
 news-moderation; no-subject; digests; suspicious-header
CC: John Wunderlich <john@wunderlich.ca>, IETF oauth WG <oauth@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: =?utf-8?q?=5BOAUTH-WG=5D_Re=3A_Alternative_text_for_sd-jwt_privacy_considera?=
	=?utf-8?q?tions=2E?=
List-Id: OAUTH WG <oauth.ietf.org>
Archived-At: 
 <https://mailarchive.ietf.org/arch/msg/oauth/nUofF_dijV-lLSVn_I0PeeS8GDE>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Owner: <mailto:oauth-owner@ietf.org>
List-Post: <mailto:oauth@ietf.org>
List-Subscribe: <mailto:oauth-join@ietf.org>
List-Unsubscribe: <mailto:oauth-leave@ietf.org>

--000000000000105593062a0f4425
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hah, nationalization of telcos sounds very spicy and dangerous! I think a
private sector entity (corp, non-profit, PBC, trust company, etc.) that is
certified by an org like Kantara for identity provisioning with the
upcoming NIST SP 800-63-4 would be interesting, and it could support a
variety of cryptographic mechanisms for issuing anonymous tokens to enhance
privacy, but also CMVP-friendly ones. Let's Encrypt is a good case study
from the land of CAs, and you could imagine retooling ACME with oauth2 to
support delegated PIV. However, we may be veering outside of the scope of
the list with this topic.

Best,
Wayne Chang
Founder & CEO | SpruceID <https://spruceid.com/> | LinkedIn
<https://www.linkedin.com/in/waynebuilds/>


On Wed, Dec 25, 2024 at 02:34 Tom Jones <thomasclinganjones@gmail.com>
wrote:

> There is always the potential to come up with a cred that will be accepte=
d
> as enabling access to some resource.
> There are some proof mechanisms that state that the bearer has a cred tha=
t
> enables access.
> What we have not achieved is a mechanism that ties the cred to the holder
> without an ID number binding to the holder.
> That would be a good thing - but the only way I know involves trusting th=
e
> telco - which we all know is a dead end.
> What other mechanism can bind the holder to the device w/o the telco (or
> do we just nationalize the telcos again.)
>
> Peace ..tom jones
>
>
> On Tue, Dec 24, 2024 at 10:29=E2=80=AFAM Wayne Chang <wayne@spruceid.com>=
 wrote:
>
>> No, I don=E2=80=99t mean an ID number. More so attributes of an entity a=
ttested
>> by a non-governmental entity, and it could use privacy enhancing
>> cryptography in this steelman.
>>
>> Best,
>> Wayne Chang
>> Founder & CEO | SpruceID <https://spruceid.com/> | LinkedIn
>> <https://www.linkedin.com/in/waynebuilds/>
>>
>>
>> On Wed, Dec 25, 2024 at 02:17 Tom Jones <thomasclinganjones@gmail.com>
>> wrote:
>>
>>> if by ID you mean ID number - then it is a tracking number.
>>> Isn't it super obvious - why are we pretending to be privacy enabling?
>>>
>>> Peace ..tom jones
>>>
>>>
>>> On Tue, Dec 24, 2024 at 10:15=E2=80=AFAM Wayne Chang <wayne@spruceid.co=
m> wrote:
>>>
>>>> Tom, how do you feel about private sector issued ID?
>>>>
>>>> Best,
>>>> Wayne Chang
>>>> Founder & CEO | SpruceID <https://spruceid.com/> | LinkedIn
>>>> <https://www.linkedin.com/in/waynebuilds/>
>>>>
>>>>
>>>> On Wed, Dec 25, 2024 at 02:04 Tom Jones <thomasclinganjones@gmail.com>
>>>> wrote:
>>>>
>>>>> While Waton's statement is correct - it does not address the core
>>>>> problem with any credential that comes with an ID.
>>>>>
>>>>> All reusable IDs enable tracking.  Full Stop.
>>>>> All government issued ID enable tracking. Just like social insurance
>>>>> number or any other cred.
>>>>> So - if you want privacy - don't release the ID number.
>>>>>
>>>>> Peace ..tom jones
>>>>>
>>>>>
>>>>> On Tue, Dec 24, 2024 at 6:34=E2=80=AFAM Watson Ladd <watsonbladd@gmai=
l.com>
>>>>> wrote:
>>>>>
>>>>>> I see that people are uncomfortable with making any mandates, and so
>>>>>> I've tried to be purely descriptive in this proposal. I leave it to =
the WG
>>>>>> to decide where to put it, but I see it as a wholesale replacement f=
or some
>>>>>> sections to emphasize clarity.
>>>>>>
>>>>>>  "SD-JWT conceals only the values that aren't revealed. It does not
>>>>>> meet standard security notations for anonymous credentials. In parti=
cular
>>>>>> Verifiers and Issuers can know when they have seen the same credenti=
al no
>>>>>> matter what fields have been opened, even none of them. This behavio=
r may
>>>>>> not accord with what users naively expect or are lead to expect from=
 UX
>>>>>> interactions and lead to them make choices they would not otherwise =
make.
>>>>>> Workarounds such as issuing multiple credentials at once and using t=
hem
>>>>>> only one time can help for keeping Verifiers from linking different
>>>>>> showing, but cannot work for Issuers. This issue applies to all sele=
ctive
>>>>>> disclosure based approaches, including mdoc. "
>>>>>>
>>>>>> Sincerely,
>>>>>> Watson
>>>>>> _______________________________________________
>>>>>> OAuth mailing list -- oauth@ietf.org
>>>>>> To unsubscribe send an email to oauth-leave@ietf.org
>>>>>>
>>>>> _______________________________________________
>>>>> OAuth mailing list -- oauth@ietf.org
>>>>> To unsubscribe send an email to oauth-leave@ietf.org
>>>>>
>>>> _______________________________________________
>>>> OAuth mailing list -- oauth@ietf.org
>>>> To unsubscribe send an email to oauth-leave@ietf.org
>>>>
>>> _______________________________________________
>> OAuth mailing list -- oauth@ietf.org
>> To unsubscribe send an email to oauth-leave@ietf.org
>>
>

--000000000000105593062a0f4425
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"auto">Hah, nationalization of telcos sounds ve=
ry spicy and dangerous! I think a private sector entity (corp, non-profit, =
PBC, trust company, etc.) that is certified by an org like Kantara for iden=
tity provisioning with the upcoming NIST SP=C2=A0800-63-4 would be interest=
ing, and it could support a variety of cryptographic mechanisms for issuing=
 anonymous tokens to enhance privacy, but also CMVP-friendly ones. Let&#39;=
s Encrypt is a good case study from the land of CAs, and you could imagine =
retooling ACME with oauth2 to support delegated PIV. However, we may be vee=
ring outside of the scope of the list with this topic.<div dir=3D"auto"><br=
></div><div dir=3D"auto">Best,</div><div><div dir=3D"ltr" class=3D"gmail_si=
gnature" data-smartmail=3D"gmail_signature"><div dir=3D"ltr"><div>Wayne Cha=
ng</div><div>Founder &amp; CEO | <a href=3D"https://spruceid.com/" target=
=3D"_blank">SpruceID</a>=C2=A0| <a href=3D"https://www.linkedin.com/in/wayn=
ebuilds/" target=3D"_blank">LinkedIn</a></div></div></div></div></div></div=
><div><br></div><div><br><div class=3D"gmail_quote"><div dir=3D"ltr" class=
=3D"gmail_attr">On Wed, Dec 25, 2024 at 02:34 Tom Jones &lt;<a href=3D"mail=
to:thomasclinganjones@gmail.com" target=3D"_blank">thomasclinganjones@gmail=
.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"mar=
gin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1=
ex"><div dir=3D"ltr"><div>There is always the potential to come up with a c=
red that will be accepted as enabling access to some resource.</div><div>Th=
ere are some proof mechanisms that state that the bearer has a cred that en=
ables access.</div><div>What we have not achieved is a mechanism that ties =
the cred to the holder without an ID=C2=A0number binding to the holder.</di=
v><div>That would be a good thing - but the only way I know involves trusti=
ng the telco - which we all know is a dead end.</div><div>What other mechan=
ism can bind the holder to the device w/o the telco (or do we just national=
ize the telcos again.)</div><div><br></div><div><div dir=3D"ltr" class=3D"g=
mail_signature"><div dir=3D"ltr"><font face=3D"-apple-system, system-ui, sy=
stem-ui, Segoe UI, Roboto, Helvetica Neue, Fira Sans, Ubuntu, Oxygen, Oxyge=
n Sans, Cantarell, Droid Sans, Apple Color Emoji, Segoe UI Emoji, Segoe UI =
Symbol, Lucida Grande, Helvetica, Arial, sans-serif" style=3D"font-family:-=
apple-system,system-ui,system-ui,&quot;Segoe UI&quot;,Roboto,&quot;Helvetic=
a Neue&quot;,&quot;Fira Sans&quot;,Ubuntu,Oxygen,&quot;Oxygen Sans&quot;,Ca=
ntarell,&quot;Droid Sans&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI=
 Emoji&quot;,&quot;Segoe UI Symbol&quot;,&quot;Lucida Grande&quot;,Helvetic=
a,Arial,sans-serif;color:rgb(56,118,29)"><span style=3D"font-size:14px;font=
-family:-apple-system,system-ui,system-ui,&quot;Segoe UI&quot;,Roboto,&quot=
;Helvetica Neue&quot;,&quot;Fira Sans&quot;,Ubuntu,Oxygen,&quot;Oxygen Sans=
&quot;,Cantarell,&quot;Droid Sans&quot;,&quot;Apple Color Emoji&quot;,&quot=
;Segoe UI Emoji&quot;,&quot;Segoe UI Symbol&quot;,&quot;Lucida Grande&quot;=
,Helvetica,Arial,sans-serif;background-color:rgb(242,242,242)">Peace  ..tom=
 jones</span></font></div></div></div><br></div><br><div class=3D"gmail_quo=
te"><div dir=3D"ltr" class=3D"gmail_attr">On Tue, Dec 24, 2024 at 10:29=E2=
=80=AFAM Wayne Chang &lt;<a href=3D"mailto:wayne@spruceid.com" target=3D"_b=
lank">wayne@spruceid.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail=
_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204=
,204);padding-left:1ex"><div dir=3D"auto">No, I don=E2=80=99t mean an ID nu=
mber. More so attributes of an entity attested by a non-governmental entity=
, and it could use privacy enhancing cryptography in this steelman.<br clea=
r=3D"all"><br clear=3D"all"><div><div dir=3D"ltr" class=3D"gmail_signature"=
><div dir=3D"ltr">Best,<div>Wayne Chang</div><div>Founder &amp; CEO | <a hr=
ef=3D"https://spruceid.com/" target=3D"_blank">SpruceID</a>=C2=A0| <a href=
=3D"https://www.linkedin.com/in/waynebuilds/" target=3D"_blank">LinkedIn</a=
></div></div></div></div></div><div><br></div><div><br><div class=3D"gmail_=
quote"><div dir=3D"ltr" class=3D"gmail_attr">On Wed, Dec 25, 2024 at 02:17 =
Tom Jones &lt;<a href=3D"mailto:thomasclinganjones@gmail.com" target=3D"_bl=
ank">thomasclinganjones@gmail.com</a>&gt; wrote:<br></div><blockquote class=
=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rg=
b(204,204,204);padding-left:1ex"><div dir=3D"ltr"><div>if by ID you mean ID=
 number - then it is a tracking number.</div><div>Isn&#39;t it super obviou=
s - why are we pretending to be privacy enabling?</div><div><br></div><div>=
<div dir=3D"ltr" class=3D"gmail_signature"><div dir=3D"ltr"><font face=3D"-=
apple-system, system-ui, system-ui, Segoe UI, Roboto, Helvetica Neue, Fira =
Sans, Ubuntu, Oxygen, Oxygen Sans, Cantarell, Droid Sans, Apple Color Emoji=
, Segoe UI Emoji, Segoe UI Symbol, Lucida Grande, Helvetica, Arial, sans-se=
rif" style=3D"font-family:-apple-system,system-ui,system-ui,&quot;Segoe UI&=
quot;,Roboto,&quot;Helvetica Neue&quot;,&quot;Fira Sans&quot;,Ubuntu,Oxygen=
,&quot;Oxygen Sans&quot;,Cantarell,&quot;Droid Sans&quot;,&quot;Apple Color=
 Emoji&quot;,&quot;Segoe UI Emoji&quot;,&quot;Segoe UI Symbol&quot;,&quot;L=
ucida Grande&quot;,Helvetica,Arial,sans-serif;color:rgb(56,118,29)"><span s=
tyle=3D"font-size:14px;font-family:-apple-system,system-ui,system-ui,&quot;=
Segoe UI&quot;,Roboto,&quot;Helvetica Neue&quot;,&quot;Fira Sans&quot;,Ubun=
tu,Oxygen,&quot;Oxygen Sans&quot;,Cantarell,&quot;Droid Sans&quot;,&quot;Ap=
ple Color Emoji&quot;,&quot;Segoe UI Emoji&quot;,&quot;Segoe UI Symbol&quot=
;,&quot;Lucida Grande&quot;,Helvetica,Arial,sans-serif;background-color:rgb=
(242,242,242)">Peace  ..tom jones</span></font></div></div></div><br></div>=
<br><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Tue=
, Dec 24, 2024 at 10:15=E2=80=AFAM Wayne Chang &lt;<a href=3D"mailto:wayne@=
spruceid.com" target=3D"_blank">wayne@spruceid.com</a>&gt; wrote:<br></div>=
<blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-=
left:1px solid rgb(204,204,204);padding-left:1ex"><div dir=3D"auto">Tom, ho=
w do you feel about private sector issued ID?<br clear=3D"all"><br clear=3D=
"all"><div><div dir=3D"ltr" class=3D"gmail_signature"><div dir=3D"ltr">Best=
,<div>Wayne Chang</div><div>Founder &amp; CEO | <a href=3D"https://spruceid=
.com/" target=3D"_blank">SpruceID</a>=C2=A0| <a href=3D"https://www.linkedi=
n.com/in/waynebuilds/" target=3D"_blank">LinkedIn</a></div></div></div></di=
v></div><div><br></div><div><br><div class=3D"gmail_quote"><div dir=3D"ltr"=
 class=3D"gmail_attr">On Wed, Dec 25, 2024 at 02:04 Tom Jones &lt;<a href=
=3D"mailto:thomasclinganjones@gmail.com" target=3D"_blank">thomasclinganjon=
es@gmail.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" styl=
e=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);paddin=
g-left:1ex"><div dir=3D"ltr"><div>While Waton&#39;s statement is correct - =
it does not address the core problem with any credential that comes with an=
 ID.</div><div><br></div><div>All reusable IDs enable tracking.=C2=A0 Full =
Stop.</div><div>All government issued ID enable tracking. Just like social =
insurance number or any other=C2=A0cred.</div><div>So - if you want privacy=
 - don&#39;t release the ID number.</div><div><br></div><div><div dir=3D"lt=
r" class=3D"gmail_signature"><div dir=3D"ltr"><font face=3D"-apple-system, =
system-ui, system-ui, Segoe UI, Roboto, Helvetica Neue, Fira Sans, Ubuntu, =
Oxygen, Oxygen Sans, Cantarell, Droid Sans, Apple Color Emoji, Segoe UI Emo=
ji, Segoe UI Symbol, Lucida Grande, Helvetica, Arial, sans-serif" style=3D"=
font-family:-apple-system,system-ui,system-ui,&quot;Segoe UI&quot;,Roboto,&=
quot;Helvetica Neue&quot;,&quot;Fira Sans&quot;,Ubuntu,Oxygen,&quot;Oxygen =
Sans&quot;,Cantarell,&quot;Droid Sans&quot;,&quot;Apple Color Emoji&quot;,&=
quot;Segoe UI Emoji&quot;,&quot;Segoe UI Symbol&quot;,&quot;Lucida Grande&q=
uot;,Helvetica,Arial,sans-serif;color:rgb(56,118,29)"><span style=3D"font-s=
ize:14px;font-family:-apple-system,system-ui,system-ui,&quot;Segoe UI&quot;=
,Roboto,&quot;Helvetica Neue&quot;,&quot;Fira Sans&quot;,Ubuntu,Oxygen,&quo=
t;Oxygen Sans&quot;,Cantarell,&quot;Droid Sans&quot;,&quot;Apple Color Emoj=
i&quot;,&quot;Segoe UI Emoji&quot;,&quot;Segoe UI Symbol&quot;,&quot;Lucida=
 Grande&quot;,Helvetica,Arial,sans-serif;background-color:rgb(242,242,242)"=
>Peace  ..tom jones</span></font></div></div></div><br></div><br><div class=
=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Tue, Dec 24, 2024=
 at 6:34=E2=80=AFAM Watson Ladd &lt;<a href=3D"mailto:watsonbladd@gmail.com=
" target=3D"_blank">watsonbladd@gmail.com</a>&gt; wrote:<br></div><blockquo=
te class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px =
solid rgb(204,204,204);padding-left:1ex"><div dir=3D"ltr"><div>I see that p=
eople are uncomfortable with making any mandates, and so I&#39;ve tried to =
be purely descriptive in this proposal. I leave it to the WG to decide wher=
e to put it, but I see it as a wholesale replacement for some sections to e=
mphasize clarity.</div><div><br></div><div>=C2=A0&quot;SD-JWT conceals only=
 the values that aren&#39;t revealed. It does not meet standard security no=
tations for anonymous credentials. In particular Verifiers and Issuers can =
know when they have seen the same credential no matter what fields have bee=
n opened, even none of them. This behavior may not accord with what users n=
aively expect or are lead to expect from UX interactions and lead to them m=
ake choices they would not otherwise make. Workarounds such as issuing mult=
iple credentials at once and using them only one time can help for keeping =
Verifiers from linking different showing, but cannot work for Issuers. This=
 issue applies to all selective disclosure based approaches, including mdoc=
. &quot;<br></div><div><br></div><div>Sincerely,</div><div>Watson<br></div>=
</div>
_______________________________________________<br>
OAuth mailing list -- <a href=3D"mailto:oauth@ietf.org" target=3D"_blank">o=
auth@ietf.org</a><br>
To unsubscribe send an email to <a href=3D"mailto:oauth-leave@ietf.org" tar=
get=3D"_blank">oauth-leave@ietf.org</a><br>
</blockquote></div>
_______________________________________________<br>
OAuth mailing list -- <a href=3D"mailto:oauth@ietf.org" target=3D"_blank">o=
auth@ietf.org</a><br>
To unsubscribe send an email to <a href=3D"mailto:oauth-leave@ietf.org" tar=
get=3D"_blank">oauth-leave@ietf.org</a><br>
</blockquote></div></div>
_______________________________________________<br>
OAuth mailing list -- <a href=3D"mailto:oauth@ietf.org" target=3D"_blank">o=
auth@ietf.org</a><br>
To unsubscribe send an email to <a href=3D"mailto:oauth-leave@ietf.org" tar=
get=3D"_blank">oauth-leave@ietf.org</a><br>
</blockquote></div>
</blockquote></div></div>
_______________________________________________<br>
OAuth mailing list -- <a href=3D"mailto:oauth@ietf.org" target=3D"_blank">o=
auth@ietf.org</a><br>
To unsubscribe send an email to <a href=3D"mailto:oauth-leave@ietf.org" tar=
get=3D"_blank">oauth-leave@ietf.org</a><br>
</blockquote></div>
</blockquote></div></div>

--000000000000105593062a0f4425--

