[SCITT] Re: [EXTERNAL] Re: FYI: Use Case example of SCITT trust check for VS Code to avoid untrusted VS Code extensions
Dick Brooks <dick@businesscyberguardian.com> Wed, 07 January 2026 14:08 UTC
Return-Path: <dick@businesscyberguardian.com>
X-Original-To: scitt@mail2.ietf.org
Delivered-To: scitt@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id B181AA403F40 for <scitt@mail2.ietf.org>; Wed, 7 Jan 2026 06:08:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.798
X-Spam-Level:
X-Spam-Status: No, score=-2.798 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=businesscyberguardian.com header.b="UUUvuCBE"; dkim=pass (2048-bit key) header.d=messagingengine.com header.b="ueDtipai"
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EtDt8iBsaOPq for <scitt@mail2.ietf.org>; Wed, 7 Jan 2026 06:08:43 -0800 (PST)
Received: from fhigh-a1-smtp.messagingengine.com (fhigh-a1-smtp.messagingengine.com [103.168.172.152]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256)) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id E6D72A403B5A for <scitt@ietf.org>; Wed, 7 Jan 2026 06:07:51 -0800 (PST)
Received: from phl-compute-08.internal (phl-compute-08.internal [10.202.2.48]) by mailfhigh.phl.internal (Postfix) with ESMTP id D17C614000D7; Wed, 7 Jan 2026 09:07:51 -0500 (EST)
Received: from phl-frontend-03 ([10.202.2.162]) by phl-compute-08.internal (MEProxy); Wed, 07 Jan 2026 09:07:51 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= businesscyberguardian.com; h=cc:content-type:content-type:date :date:from:from:in-reply-to:in-reply-to:message-id:mime-version :references:reply-to:reply-to:subject:subject:to:to; s=fm2; t= 1767794871; x=1767881271; bh=65xmzYCqNbimy/RWjkTTugzitnlw7KkzK/Q QCIfnOCs=; b=UUUvuCBE25Pwwlch9PT6+esbN5yH7Keejgg/3wFH7IBKJ3pPH12 nfxHY+j0t9tTDw1p0p3Xxxav9EUXaw0Ma9uZKsRS/28ZJ6iGfnM1dUkoYk1aHgIh j83mXhwa7OZXRdood3XRS6ETGmU7qRO3cWfuVbz1+V+WLlEBCBPPZSRJUNTQ9k8o 2yIrg4XDgYsMGF4Vgg5TOiowG+lbnRVeJTdYJYS1eWuILnuWE+JBHGpmPcTSY3rF hxXs4pKA+YSJBL3rLcxEOU5DHAMARNqWLyVvsZ2h6ZnPDXNISpbQ/WVWNcEnQk49 tqpEh5cMufqClm2nxTezFTL2HtpMNjFiA2A==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:content-type:date:date :feedback-id:feedback-id:from:from:in-reply-to:in-reply-to :message-id:mime-version:references:reply-to:reply-to:subject :subject:to:to:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s= fm2; t=1767794871; x=1767881271; bh=65xmzYCqNbimy/RWjkTTugzitnlw 7KkzK/QQCIfnOCs=; b=ueDtipaiuAhQShAAPHOwg58q0kj1K4aDWFw+buwAgMWy LALRyZ6cAjggt4BTn35OZ0xZSqgFXLc1eJKK0imlFNjjI0YFCTUVFbhuAthi5iOW MlZF+3hxrHwsDv7kLs/qeOFs4lei+k2bRfX91BjL8yQVeMN5Ye+D6x4z8Cz6hIGg bvYzmIvNta+JmE0DXSQHRu967Jz65BS6zlCfWbwWDf3nn85mlQRZ+deL9JYR+Vb1 WKmIfRV9bBGNviPOOU5BW8OslqFvNI+SPVT7SvZ9Wi2CZxCqMozBH006YZUe50xu jViOR99YLH9pIWre15fNAYOD5RI72XnOiCcXoyL3EA==
X-ME-Sender: <xms:t2heaTrEMAOStdxYEHjceUw-s6UT8u3z1Oc_vYyZYt6MMNfsTkELTA> <xme:t2heaR-UH_snGPLfgGIWKBcXtakjP1p_VaWk9Ou3zSMqpETvdDMsk_0GG19joqqN2 zV40UOiSu6ACl76JseX4OIdcW1Z1l3VlaKJLArVdS5ORRduVeAeHA>
X-ME-Received: <xmr:t2heafWdrpUAY_GxEEAAx_SFOkvBnw3Ms41KQe2b7tjdp0l3WvY1sMM>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeefgedrtddtgddutdefvdejucetufdoteggodetrf dotffvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfurfetoffkrfgpnffqhgenuceu rghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmnecujf gurheprhfhvfhfjgfuffhokfggtgfothesrhdtghepvddtjeenucfhrhhomhepfdffihgt khcuuehrohhokhhsfdcuoeguihgtkhessghushhinhgvshhstgihsggvrhhguhgrrhguih grnhdrtghomheqnecuggftrfgrthhtvghrnhepgedutdfgfeetudfgveeglefhieduffei keduvdfhieeulefhgeeigfeiiefhteffnecuffhomhgrihhnpehsohhfthifrghrvggrsh hsuhhrrghntggvghhurghrughirghnrdgtohhmpdhrvghlihgrsghlvggvnhgvrhhghigr nhgrlhihthhitghsrdgtohhmpdgsuhhsihhnvghsshgthigsvghrghhurghrughirghnrd gtohhmpdhvvghrihhtrghstghhrghinhdrohhrghdpohhrtghiugdrohhrghdplhhinhhk vgguihhnrdgtohhmpdhnvgigthhgohhvrdgtohhmnecuvehluhhsthgvrhfuihiivgeptd enucfrrghrrghmpehmrghilhhfrhhomhepughitghksegsuhhsihhnvghsshgthigsvghr ghhurghrughirghnrdgtohhmpdhnsggprhgtphhtthhopeefpdhmohguvgepshhmthhpoh huthdprhgtphhtthhopegrmhgruhhrhidrtghhrghmrgihohhusehmihgtrhhoshhofhht rdgtohhmpdhrtghpthhtohepkhgrmhhimhhurhgrsehvvghrihhtrghstghhrghinhdroh hrghdprhgtphhtthhopehstghithhtsehivghtfhdrohhrgh
X-ME-Proxy: <xmx:t2heafBW8WL5lxB0aWtOGA11Gxr9_QcYikncZm7tzdwYjXXdzeuPSA> <xmx:t2heaYysm25mG_KhoYxvPYazIrk5B19Jl16MQCDkRyYFOsBZOFJ4Mg> <xmx:t2heaUDDKFexqQuIMTAj5egyYUlMTkvo-ZrAFbv30EF6RjUob4dA3A> <xmx:t2headYdKKX_sGP5ALy7cnDL8NakhnuuEZFNToveuAlQYmhQv5ZkUg> <xmx:t2heabNHgs3K5TNyQIDAqe_pJ6wPIjCdQHXAeBt6YYk1H_wbhs09ggDF>
Feedback-ID: i99214975:Fastmail
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Wed, 7 Jan 2026 09:07:51 -0500 (EST)
From: Dick Brooks <dick@businesscyberguardian.com>
To: "'Tokachi Kamimura, VSO'" <kamimura@veritaschain.org>, 'Amaury Chamayou' <Amaury.Chamayou@microsoft.com>, scitt@ietf.org
References: <04ca01dc7f29$2c998ec0$85ccac40$@businesscyberguardian.com> <0e7c321d-2b06-4056-b1ae-e8ff68f7c3bf@Spark> <060601dc7f35$dfbdbba0$9f3932e0$@businesscyberguardian.com> <d02691c3-a0f0-4d4d-9bf8-f67a033b0a83@Spark> <08b401dc7f6c$e51534c0$af3f9e40$@businesscyberguardian.com> <4c9d9384-5aba-43f9-9540-ed363baf30f1@Spark> <09a201dc7fd3$9266a620$b733f260$@businesscyberguardian.com> <76bd8e96-d420-45e9-bf30-02432b1858f0@Spark> <09f401dc7fd8$67c8d230$375a7690$@businesscyberguardian.com> <VI0PR83MB0591ED84FC2FCE648C259BD3F984A@VI0PR83MB0591.EURPRD83.prod.outlook.com> <0a5d01dc7fdb$97da6530$c78f2f90$@businesscyberguardian.com> <6286d87f-368b-4a73-890f-90f5797342cc@Spark>
In-Reply-To: <6286d87f-368b-4a73-890f-90f5797342cc@Spark>
Date: Wed, 07 Jan 2026 09:07:49 -0500
Organization: Business Cyber Guardian
Message-ID: <0ab001dc7fdf$02556e20$07004a60$@businesscyberguardian.com>
MIME-Version: 1.0
Content-Type: multipart/related; boundary="----=_NextPart_000_0AB1_01DC7FB5.1981D720"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQBUejb/AKypm1RXFn4W8W0D90fhOQJKPhufAxa6gMoBxhbUyAJGfTG0AUrzS/AB+JNMzgD4hOQcAiqoV74CQCkv0wJ2TGrbAmoOiQy3nyG6QA==
Content-Language: en-us
Message-ID-Hash: GUGDCJC4BHLVUU4SZO67KLTW6T2EDMHT
X-Message-ID-Hash: GUGDCJC4BHLVUU4SZO67KLTW6T2EDMHT
X-MailFrom: dick@businesscyberguardian.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Reply-To: dick@businesscyberguardian.com
Subject: [SCITT] Re: [EXTERNAL] Re: FYI: Use Case example of SCITT trust check for VS Code to avoid untrusted VS Code extensions
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/qrVQ02OOO2Eypd-SkKUsE9g0eSk>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Owner: <mailto:scitt-owner@ietf.org>
List-Post: <mailto:scitt@ietf.org>
List-Subscribe: <mailto:scitt-join@ietf.org>
List-Unsubscribe: <mailto:scitt-leave@ietf.org>
Here is an example SAG-CTR API call to lookup the current “Trust Status” for a known product in JSON output (for automation) using the “public APIs” https://softwareassuranceguardian.com/labellink/getTrustedProductLabel?ProductID=E6CC8B4801EC3408BB2FB481CA7A1FB1B775ACFC330B6E8CD996E5882ECF44FA AND human readable html https://softwareassuranceguardian.com/labellink/getTrustedProductLabel?ProductID=E6CC8B4801EC3408BB2FB481CA7A1FB1B775ACFC330B6E8CD996E5882ECF44FA <https://softwareassuranceguardian.com/labellink/getTrustedProductLabel?ProductID=E6CC8B4801EC3408BB2FB481CA7A1FB1B775ACFC330B6E8CD996E5882ECF44FA&html=1> &html=1 This will also give you the ability to check performance of these lookups, usually less than 500 ms Thanks, Dick Brooks Active Member of the CISA Critical Manufacturing Sector, Sector Coordinating Council – A Public-Private Partnership Lifetime IEEE Member <https://reliableenergyanalytics.com/products> Never trust software, always verify and report! ™ Risk always exists, but trust must be earned and awarded.™ https://businesscyberguardian.com/ Email: dick@businesscyberguardian.com Tel: +1 978-696-1788 From: Tokachi Kamimura, VSO <kamimura@veritaschain.org> Sent: Wednesday, January 7, 2026 8:49 AM To: dick@businesscyberguardian.com; Amaury Chamayou <Amaury.Chamayou@microsoft.com>; scitt@ietf.org Subject: RE: [EXTERNAL] [SCITT] Re: FYI: Use Case example of SCITT trust check for VS Code to avoid untrusted VS Code extensions I think all three points are valid, and they don’t actually conflict. SCITT receipts are excellent at proving *historical facts*: that a statement was registered, under a given policy, at a given time. They are not meant to be a real-time signal of current trust state. For real-time or risk-based decisions, what matters is the *current view*: revocations, compensating transactions, updated assessments, etc. That naturally requires a lookup or a derived state — not just the original receipt. >From an architectural perspective, this suggests a clean layering: • SCITT + SCRAPI define the immutable, auditable history • Receipts bind artifacts and declarations to that history • Runtime trust decisions operate on a derived, fast state view • TEA / delivery mechanisms carry the evidence needed to make that decision • Relying parties choose freshness and policy thresholds In that sense, SCITT is the trust *foundation*, not the trust *oracle*. The dynamic trust signal is built on top, but remains accountable because it can always be traced back to verifiable SCITT records. That separation feels essential if we want both correctness and usability. ======== Tokachi Kamimura Executive Director VeritasChain Standards Organization (VSO) The Flight Recorder for AI Systems — Verify, Don’t Trust — VeritasChain Standards Organization (VSO) Non-profit, vendor-neutral technical standards body Overview: https://veritaschain.org/overview/ Email: kamimura@veritaschain.org <mailto:kamimura@veritaschain.org> Website: https://veritaschain.org ORCiD: https://orcid.org/0009-0002-0871-1627 <https://veritaschain.org> VCP Explorer (Demo): https://veritaschain.org/explorer/app/ LinkedIn: https://www.linkedin.com/in/tokachi/ Tokyo Office: Ebisu, Shibuya-ku, Tokyo 150-0021, Japan 2026年1月7日 22:43 +0900、Dick Brooks <dick@businesscyberguardian.com <mailto:dick@businesscyberguardian.com> >のメール: I agree Amaury, the SCITT receipt tell that a “Trust Declaration” is/was once registered in a Trust Registry, but it does not provide updated/dynamic info, such as a dynamic “trust scores” that is needed in real-time risk-based decisions for Secure by Design and Secure by Default applications. Also, the original receipt when the signed statement was “registered” would not indicate if a registry entry was later revoked with a compensating transaction, but a real-time lookup would provide the “current status”. Thanks, Dick Brooks <image010.png> <image011.png> <image012.png> Active Member of the CISA Critical Manufacturing Sector, Sector Coordinating Council – A Public-Private Partnership Lifetime IEEE Member <https://reliableenergyanalytics.com/products> Never trust software, always verify and report! ™ Risk always exists, but trust must be earned and awarded.™ https://businesscyberguardian.com/ Email: dick@businesscyberguardian.com <mailto:dick@businesscyberguardian.com> Tel: +1 978-696-1788 From: Amaury Chamayou <Amaury.Chamayou@microsoft.com <mailto:Amaury.Chamayou@microsoft.com> > Sent: Wednesday, January 7, 2026 8:29 AM To: 'Tokachi Kamimura, VSO' <kamimura@veritaschain.org <mailto:kamimura@veritaschain.org> >; scitt@ietf.org <mailto:scitt@ietf.org> ; dick@businesscyberguardian.com <mailto:dick@businesscyberguardian.com> Subject: Re: [EXTERNAL] [SCITT] Re: FYI: Use Case example of SCITT trust check for VS Code to avoid untrusted VS Code extensions An important property of SCITT Receipts is that they can be embedded in Signed Statements, and verified offline, in situations where online access is too slow or not possible. This makes Transparent Statements very broadly applicable, without online access to a single point of failure service, and lets Relying Parties decide for themselves how fresh Statements must be in order to be acceptable. I expected usage of SCITT will often be similar to CT today, where the SCTs are included in the certificate, and browsers maintain a policy for which CT Logs/SCT issuers they trust, but do not contact the CT logs online every time they establish a connection. Amaury _____ From: Dick Brooks <dick@businesscyberguardian.com <mailto:dick@businesscyberguardian.com> > Sent: 07 January 2026 13:20 To: 'Tokachi Kamimura, VSO' <kamimura@veritaschain.org <mailto:kamimura@veritaschain.org> >; scitt@ietf.org <mailto:scitt@ietf.org> <scitt@ietf.org <mailto:scitt@ietf.org> > Subject: [EXTERNAL] [SCITT] Re: FYI: Use Case example of SCITT trust check for VS Code to avoid untrusted VS Code extensions Tokachi, I believe we are 100% in alignment. Now we need to focus our energies on SCRAPI to complete the picture and make Trust Registries part of critical digital infrastructure that people rely on and trust. Thanks, Dick Brooks <image007.png> <image008.png> <image009.png> Active Member of the CISA Critical Manufacturing Sector, Sector Coordinating Council – A Public-Private Partnership Lifetime IEEE Member <https://reliableenergyanalytics.com/products> Never trust software, always verify and report! ™ Risk always exists, but trust must be earned and awarded.™ https://businesscyberguardian.com/ Email: dick@businesscyberguardian.com <mailto:dick@businesscyberguardian.com> Tel: +1 978-696-1788 From: Tokachi Kamimura, VSO <kamimura@veritaschain.org <mailto:kamimura@veritaschain.org> > Sent: Wednesday, January 7, 2026 8:08 AM To: dick@businesscyberguardian.com <mailto:dick@businesscyberguardian.com> ; scitt@ietf.org <mailto:scitt@ietf.org> Subject: RE: [SCITT] FYI: Use Case example of SCITT trust check for VS Code to avoid untrusted VS Code extensions Thanks Dick — this resonates a lot. I think you’ve identified a critical architectural boundary that often gets missed in trust registry discussions. There are really two very different paths here: - a *public query path* that must be fast, scalable, and usable in real time - and a *registration / evidence path* that can be slower, stricter, and policy-heavy Trying to force both through the same VDS execution path is where performance and adoption break down. Your approach — a fast cache lookup for Trust Declarations that is *independently verifiable* against SCITT VDS controls — feels like the right separation of concerns. In other words: speed belongs at the edge, integrity belongs in the ledger, and trust comes from being able to prove that the two are cryptographically linked. If public trust queries can’t be answered in sub-second time, they simply won’t be used — no matter how correct the backend is. ======== Tokachi Kamimura Executive Director VeritasChain Standards Organization (VSO) The Flight Recorder for AI Systems — Verify, Don’t Trust — VeritasChain Standards Organization (VSO) Non-profit, vendor-neutral technical standards body Overview: https://veritaschain.org/overview/ Email: kamimura@veritaschain.org <mailto:kamimura@veritaschain.org> Website: https://veritaschain.org <https://veritaschain.org/> ORCiD: https://orcid.org/0009-0002-0871-1627 VCP Explorer (Demo): https://veritaschain.org/explorer/app/ LinkedIn: https://www.linkedin.com/in/tokachi/ Tokyo Office: Ebisu, Shibuya-ku, Tokyo 150-0021, Japan 2026年1月7日 21:46 +0900、Dick Brooks <dick@businesscyberguardian.com>のメール: Tokachi, Thanks for sharing your insights. I believe we are 100% aligned in our views on SCITT. SCITT gives a registry auditability, which verifies and confirms integrity, resulting in credibility and public trust in a Registry. Public trust is a critical success factor for a Trust Registry. One key point we’ve discovered; SCITT performance can be an issue due to the VDS integrity controls. A public query against a Trust Registry to answer the question “Is this *thing* trusted in the Trust Registry” MUST be scalable and provide sub-second response in order to be practical for Secure by Design and Secure by Default implementations in the real world. This is a critical success factor for Trust Registry implementations following SCITT. We built a “fast cache data store lookup for Trust Declarations” that doesn’t operate against the SCITT VDS inside SAG-CTR to meet this need, BUT is verifiable and auditable using the SCITT VDS controls. The registration of Trust Declarations is a much slower process and does not impact public use of the Trust Registry. I’ll let the list know if the FCC responds. Thanks, Dick Brooks <image002.png> <image004.png> <image006.png> Active Member of the CISA Critical Manufacturing Sector, Sector Coordinating Council – A Public-Private Partnership Lifetime IEEE Member <https://reliableenergyanalytics.com/products> Never trust software, always verify and report! ™ Risk always exists, but trust must be earned and awarded.™ https://businesscyberguardian.com/ Email: dick@businesscyberguardian.com <mailto:dick@businesscyberguardian.com> Tel: +1 978-696-1788 From: Tokachi Kamimura, VSO <kamimura@veritaschain.org <mailto:kamimura@veritaschain.org> > Sent: Tuesday, January 6, 2026 7:44 PM To: dick@businesscyberguardian.com <mailto:dick@businesscyberguardian.com> ; scitt@ietf.org <mailto:scitt@ietf.org> Subject: RE: [SCITT] FYI: Use Case example of SCITT trust check for VS Code to avoid untrusted VS Code extensions Thanks Dick — this is a very clear and important distinction. I strongly agree with your core point: static trust marks behave like a one-time test, not like a living signal. They create the *appearance* of safety, but not an observable, time-evolving representation of risk. The analogy to a credit score is exactly right. Trust in software is inherently dynamic and should reflect ground-truth conditions as they change — vulnerabilities, behavior, and context. I also think your description of SAC-GTR is a good example of how this can work *without turning trust into a subjective assertion*: verifiable evidence, signed statements, explicit policies, and a gatekeeper that enforces entrance criteria. Where I see SCITT fitting is as the neutral substrate underneath this. SCITT itself shouldn’t define “good” or “bad” trust — but it gives us a way to publish evidence, policies, and rejection rules in a form that others can independently verify. In other words, the real power comes from: SCITT + clearly defined registration policies + evidence-driven admission logic. On the UL point, I agree completely. When a centralized trust mark loses credibility, the gap isn’t another authority — it’s verifiable, policy-enforced trust. It’s encouraging to hear you’ve raised this with the FCC. This feels like exactly the right moment to move from static labels to continuously verifiable trust signals. ======== Tokachi Kamimura Executive Director VeritasChain Standards Organization (VSO) The Flight Recorder for AI Systems — Verify, Don’t Trust — VeritasChain Standards Organization (VSO) Non-profit, vendor-neutral technical standards body Overview: https://veritaschain.org/overview/ Email: kamimura@veritaschain.org <mailto:kamimura@veritaschain.org> Website: https://veritaschain.org <https://veritaschain.org/> ORCiD: https://orcid.org/0009-0002-0871-1627 VCP Explorer (Demo): https://veritaschain.org/explorer/app/ LinkedIn: https://www.linkedin.com/in/tokachi/ Tokyo Office: Ebisu, Shibuya-ku, Tokyo 150-0021, Japan Jan 7, 2026, 09:31 +0900, Dick Brooks <dick@businesscyberguardian.com <mailto:dick@businesscyberguardian.com> >: Tokachi, The US Cyber Trust Mark that UL administered is simply a “test” that is passed once and done, like a driver’s license. It does not reflect the “current state of security for a product” Trust in software products is far more dynamic and can change from one moment to the next, based on “ground truth” conditions over time, i.e. a new vulnerability will have a negative impact on a trust score. This is why the US Cyber Trust Mark gives a false sense of security; it’s not a real time trust score, like a credit score (FICO). In the case with SAG-CTR a trusted party must submit a “risk assessment evidence file” (verifiable evidence/Signed Statement and payload) covering 7 risk categories and also include a statistically calculated “Trust Score” called SAGScore into a “Truest Queue”. A Trust Declaration (Signed Statement) from a trusted party containing the risk assessment evidence file in the payload will be REJECTED if the “Signed Statement” and payload (Trust Declaration), fails to pass the “entrance examination described by the SAG-CTR Registration Policy requirements, enforced by the SAG-CTR Gatekeeper, as shown in this diagram, https://www.linkedin.com/posts/richard-dick-brooks-8078241_visual-model-of-an-ietf-scitt-community-product-activity-7409615006587056128-hVtU/?utm_source=share <https://www.linkedin.com/posts/richard-dick-brooks-8078241_visual-model-of-an-ietf-scitt-community-product-activity-7409615006587056128-hVtU/?utm_source=share&utm_medium=member_desktop&rcm=ACoAAABMsYcB3I6zhtjaqBqVcePEOQqxsZNzj5E> &utm_medium=member_desktop&rcm=ACoAAABMsYcB3I6zhtjaqBqVcePEOQqxsZNzj5E I agree, SCITT by itself does not impose any expectations beyond the SCITT protocol and SCRAPI. However, each Transparency Service is free to enforce Registration Policies that constrain what “signed statement materials” and payloads may be placed in “their” Trust Registry/Transparency Service VDS. I agree, the UL decision paves the way for a SCITT Trust Registry to fill the gap. I’ve reached out to the FCC on this very point. Thanks, Dick Brooks <image007.png> <image008.png> <image009.png> Active Member of the CISA Critical Manufacturing Sector, Sector Coordinating Council – A Public-Private Partnership Lifetime IEEE Member <https://reliableenergyanalytics.com/products> Never trust software, always verify and report! ™ Risk always exists, but trust must be earned and awarded.™ https://businesscyberguardian.com/ Email: dick@businesscyberguardian.com <mailto:dick@businesscyberguardian.com> Tel: +1 978-696-1788 From: Tokachi Kamimura, VSO <kamimura@veritaschain.org <mailto:kamimura@veritaschain.org> > Sent: Tuesday, January 6, 2026 6:56 PM To: dick@businesscyberguardian.com <mailto:dick@businesscyberguardian.com> ; scitt@ietf.org <mailto:scitt@ietf.org> Subject: RE: [SCITT] FYI: Use Case example of SCITT trust check for VS Code to avoid untrusted VS Code extensions Completely agree. What worries me is that “trustworthiness” is being inferred from policy statements or brand signals, rather than from verifiable evidence. Once recommendations are driven by loose or implicit policies, users have no reliable way to distinguish rigor from appearance. The UL situation really highlights this gap. When trust marks lose legitimacy, what’s missing isn’t another label, but a neutral, verifiable trust substrate. That’s where SCITT feels different to me: it doesn’t ask anyone to *assert* trustworthiness — it enables others to independently verify it. Filling that gap left by UL with an open, IETF-based mechanism seems not only timely, but necessary. ======== Tokachi Kamimura Executive Director VeritasChain Standards Organization (VSO) The Flight Recorder for AI Systems — Verify, Don’t Trust — VeritasChain Standards Organization (VSO) Non-profit, vendor-neutral technical standards body Overview: https://veritaschain.org/overview/ Email: kamimura@veritaschain.org <mailto:kamimura@veritaschain.org> Website: https://veritaschain.org <https://veritaschain.org/> ORCiD: https://orcid.org/0009-0002-0871-1627 Press & Global Coverage: https://veritaschain.org/media/ VCP Explorer (Demo): https://veritaschain.org/explorer/app/ LinkedIn: https://www.linkedin.com/in/tokachi/ Tokyo Office: Ebisu, Shibuya-ku, Tokyo 150-0021, Japan 2026年1月7日 2:57 +0900、Dick Brooks <dick@businesscyberguardian.com <mailto:dick@businesscyberguardian.com> >のメール: 100% agree Tokachi. People that trust their IDE’s to offer “trustworthy advice/recommendations” may find that these recommendations are based on “loose policies” lacking rigor. This is why an IETF SCITT Trust Registry is so vitally important, NOW, to help parties identify trustworthy products. A major shift in product trustworthiness infrastructure took place in the US today; UL has withdrawn from the US Cyber Trust Mark Program due to foreign influence concerns. IMO, this paves the way for an IETF SCITT solution to “fill the gap left by UL”. https://www.nextgov.com/cybersecurity/2026/01/ul-solutions-withdraws-lead-admin-fcc-cyber-label-program-amid-probe-china-ties/410448/?oref=ng-home-top-story Thanks, Dick Brooks <image007.png> <image008.png> <image009.png> Active Member of the CISA Critical Manufacturing Sector, Sector Coordinating Council – A Public-Private Partnership Lifetime IEEE Member <https://reliableenergyanalytics.com/products> Never trust software, always verify and report! ™ Risk always exists, but trust must be earned and awarded.™ https://businesscyberguardian.com/ Email: dick@businesscyberguardian.com <mailto:dick@businesscyberguardian.com> Tel: +1 978-696-1788 From: Tokachi Kamimura, VSO <kamimura@veritaschain.org <mailto:kamimura@veritaschain.org> > Sent: Tuesday, January 6, 2026 12:46 PM To: dick@businesscyberguardian.com <mailto:dick@businesscyberguardian.com> ; scitt@ietf.org <mailto:scitt@ietf.org> Subject: Re: [SCITT] FYI: Use Case example of SCITT trust check for VS Code to avoid untrusted VS Code extensions This is a great illustration. What stands out to me is that the failure isn’t developer behavior at all — it’s the lack of verifiable evidence around *automated recommendations*. Once an IDE recommends an extension, that recommendation effectively becomes a delegated decision. Without a verifiable decision trail, trust collapses into a single opaque control point. Using SCITT as a pre-recommendation trust signal makes a lot of sense here. It turns “trust me” into something that can actually be verified. ======== Tokachi Kamimura Executive Director VeritasChain Standards Organization (VSO) The Flight Recorder for AI Systems — Verify, Don’t Trust — VeritasChain Standards Organization (VSO) Non-profit, vendor-neutral technical standards body Overview: https://veritaschain.org/overview/ Email: kamimura@veritaschain.org <mailto:kamimura@veritaschain.org> Website: https://veritaschain.org <https://veritaschain.org/> ORCiD: https://orcid.org/0009-0002-0871-1627 Press & Global Coverage: https://veritaschain.org/media/ VCP Explorer (Demo): https://veritaschain.org/explorer/app/ LinkedIn: https://www.linkedin.com/in/tokachi/ Tokyo Office: Ebisu, Shibuya-ku, Tokyo 150-0021, Japan 2026年1月7日 2:46 +0900、dick@businesscyberguardian.com <mailto:dick@businesscyberguardian.com%E3%81%AE%E3%83%A1%E3%83%BC%E3%83%AB> のメール <mailto:dick@businesscyberguardian.com%E3%81%AE%E3%83%A1%E3%83%BC%E3%83%AB> : Dick Brooks
- [SCITT] FYI: Use Case example of SCITT trust chec… Dick Brooks
- [SCITT] Re: FYI: Use Case example of SCITT trust … Tokachi Kamimura, VSO
- [SCITT] Re: FYI: Use Case example of SCITT trust … Dick Brooks
- [SCITT] Re: FYI: Use Case example of SCITT trust … Tokachi Kamimura, VSO
- [SCITT] Re: FYI: Use Case example of SCITT trust … Dick Brooks
- [SCITT] Re: FYI: Use Case example of SCITT trust … Tokachi Kamimura, VSO
- [SCITT] Re: FYI: Use Case example of SCITT trust … Dick Brooks
- [SCITT] Re: FYI: Use Case example of SCITT trust … Tokachi Kamimura, VSO
- [SCITT] Re: FYI: Use Case example of SCITT trust … Dick Brooks
- [SCITT] Re: [EXTERNAL] Re: FYI: Use Case example … Amaury Chamayou
- [SCITT] Re: [EXTERNAL] Re: FYI: Use Case example … Dick Brooks
- [SCITT] Re: [EXTERNAL] Re: FYI: Use Case example … Olle E. Johansson
- [SCITT] Re: [EXTERNAL] Re: FYI: Use Case example … Dick Brooks
- [SCITT] Re: [EXTERNAL] Re: FYI: Use Case example … Tokachi Kamimura, VSO
- [SCITT] Re: [EXTERNAL] Re: FYI: Use Case example … Dick Brooks
- [SCITT] Re: [EXTERNAL] Re: FYI: Use Case example … Tokachi Kamimura, VSO
- [SCITT] Re: [EXTERNAL] Re: FYI: Use Case example … Dick Brooks
- [SCITT] Re: [EXTERNAL] Re: FYI: Use Case example … Tokachi Kamimura, VSO
- [SCITT] Re: FYI: Use Case example of SCITT trust … Tokachi Kamimura, VSO