[Drip] Re: Google's "AI" is mostly right & positive about DETs

Stu Card <stu.card@axenterprize.com> Tue, 24 February 2026 18:27 UTC

Return-Path: <stu.card@axenterprize.com>
X-Original-To: tm-rid@mail2.ietf.org
Delivered-To: tm-rid@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 5B540BD53E00 for <tm-rid@mail2.ietf.org>; Tue, 24 Feb 2026 10:27:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=0.001, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (1024-bit key) header.d=axenterprize.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cHguYx5gPsha for <tm-rid@mail2.ietf.org>; Tue, 24 Feb 2026 10:27:24 -0800 (PST)
Received: from PH7PR06CU001.outbound.protection.outlook.com (mail-westus3azon11020133.outbound.protection.outlook.com [52.101.201.133]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id D039BBD53DF9 for <tm-rid@ietf.org>; Tue, 24 Feb 2026 10:27:23 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=uNCHipTkQJ884QtK9VqgKeeiQm4G2I/F7g3o5Y5yAo6WQ8dfM5jRzambnfPg2UQYrL0sHFuHkLB8pTAvribPJJz5ypOU4ZGtYZcbEFtL2/O/+S5QUQ+Cz6I5U7SHcMoV78a0TdpYk3FVbxT4VMpb2CWyZlai/Q4CAn8U2Pj2kBhBHiWHH7y9+AsRi+8T8kvqthdw+QwRRki7h9owbaZQn3PWwoGNBd4UiLPnQecj3Gibxi0SJtZLabKhSiEU3A8UsOZjSV0wobTP9IjkWapFxtdFrmtrz/HqSF67CGji4x8LOHTgoYCKQmeB3WF5AbO0a2f+8ZQyOK15mUCZIytmUQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=6B/11vHBK5A/79y3avc7Wsgpwk0Tu7dsPxJytI/fDiQ=; b=q2m1yddLQ3YwzwSiyO6WWY9XPgZr+D9oA52D9BeNL9zYN3jBS5KBd2iltS3gIkwrGcyTk2qmjm5e7XfStwmTPPAWXySVcquXDoNDuYtiVGWUMerplDItyqxrebBB4lJluB2IxiZD7OoDWtNfAZ6wqnOgHt3QTyuymRWZe4Pf9Y425b30eBEjIb4xLPT0GQDO71HyK3wEiRLS+hi0BkY+2o3rJ7kK//zRZNWHeuzrPidWicXfGq7aEra+LGpmlPr6VvoyACA3UTslfpH+Z2JSAPMRu5xI9ctJIaukQquhlMwVa6oUx49qV5eEu8eSEwNn3RYyRoUtm1CoQOydMeA67w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=axenterprize.com; dmarc=pass action=none header.from=axenterprize.com; dkim=pass header.d=axenterprize.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=axenterprize.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=6B/11vHBK5A/79y3avc7Wsgpwk0Tu7dsPxJytI/fDiQ=; b=t1M9UqwhGIMw+gMT8u4oW+UAsYHTe4F+4Pfcszu/x0BDhzULIizOB2ATYyTkkwDPKzPo7/dah5lS/dDB5+PwtiBmKd3JdjmY7sUeqQSsovyQXekOSKPRL8gBx1MFt9c0tC8PVbWvVmpZ88q6bKuCSMEiivHRVt6PQ6J4GPVb6JE=
Received: from MN2PR13MB4207.namprd13.prod.outlook.com (2603:10b6:208:39::22) by LV8PR13MB6660.namprd13.prod.outlook.com (2603:10b6:408:224::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9632.22; Tue, 24 Feb 2026 18:27:14 +0000
Received: from MN2PR13MB4207.namprd13.prod.outlook.com ([fe80::282b:11a6:6c4:173f]) by MN2PR13MB4207.namprd13.prod.outlook.com ([fe80::282b:11a6:6c4:173f%4]) with mapi id 15.20.9632.017; Tue, 24 Feb 2026 18:27:14 +0000
From: Stu Card <stu.card@axenterprize.com>
To: DRIP WG <tm-rid@ietf.org>
Thread-Topic: Google's "AI" is mostly right & positive about DETs
Thread-Index: AdylurbFwRilea0wTB2rhDzaKoPWuwAACvRw
Date: Tue, 24 Feb 2026 18:27:14 +0000
Message-ID: <MN2PR13MB42077131084DE2141E6B77EEF874A@MN2PR13MB4207.namprd13.prod.outlook.com>
References: <MN2PR13MB4207E68BE32C227190F7FD2AF874A@MN2PR13MB4207.namprd13.prod.outlook.com>
In-Reply-To: <MN2PR13MB4207E68BE32C227190F7FD2AF874A@MN2PR13MB4207.namprd13.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=axenterprize.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: MN2PR13MB4207:EE_|LV8PR13MB6660:EE_
x-ms-office365-filtering-correlation-id: 110181b1-f784-4867-cfad-08de73d25536
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|366016|1800799024|376014|38070700021|8096899003|13003099007|7142099003;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MN2PR13MB4207.namprd13.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(1800799024)(376014)(38070700021)(8096899003)(13003099007)(7142099003);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_MN2PR13MB42077131084DE2141E6B77EEF874AMN2PR13MB4207namp_"
MIME-Version: 1.0
X-OriginatorOrg: axenterprize.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR13MB4207.namprd13.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 110181b1-f784-4867-cfad-08de73d25536
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Feb 2026 18:27:14.2734 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 00ad0178-ead0-441e-96ff-0c72baf3a6fa
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: snwaeropfFxNV9GlgExMQFVnpLfM7/MlsEY+m1R2wKoIGJ6HI5SdpK6i/eocqV4DdW8YHN+0a7x/cySZ+6RujHk2tREBIzoR733jmuKiP2o=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: LV8PR13MB6660
Message-ID-Hash: MTAPCXKCTSQHNWUUFBFFVKH64DV72ENC
X-Message-ID-Hash: MTAPCXKCTSQHNWUUFBFFVKH64DV72ENC
X-MailFrom: stu.card@axenterprize.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Drip] Re: Google's "AI" is mostly right & positive about DETs
List-Id: Drone Remote Identification Protocol <tm-rid.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tm-rid/yOBC9KJpO2h8wRGx8oojmLXb1Fk>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tm-rid>
List-Help: <mailto:tm-rid-request@ietf.org?subject=help>
List-Owner: <mailto:tm-rid-owner@ietf.org>
List-Post: <mailto:tm-rid@ietf.org>
List-Subscribe: <mailto:tm-rid-join@ietf.org>
List-Unsubscribe: <mailto:tm-rid-leave@ietf.org>

Or if your employer is skittish about accessing such things, here is what I got just now, mostly plain text, some HTTP[S] links to references.

==

UTM-system-assigned Universally Unique Identifiers (UUIDs) and IETF Drone Remote Identification Protocol (DRIP) Entity Tags (DETs) are both designed to uniquely identify unmanned aircraft systems (UAS) for Remote ID (RID) and traffic management, but they differ significantly in trust, structure, and capability. While UTM UUIDs are often random identifiers assigned by a service provider, DETs are cryptographic, hierarchical identifiers that provide built-in, trustable, and verifiable ownership of the identity. [1<https://datatracker.ietf.org/doc/rfc9374/>, 2<http://www.diva-portal.org/smash/record.jsf?pid=diva2:1851520>, 3<https://www.ietf.org/archive/id/draft-ietf-drip-arch-31.html>, 4<https://www.privado.id/blog/privado-id-launches-identity-verification-for-apps-in-app-zero-install-human-verification-50-faster#:~:text=Is%20cryptographically%20derived%20from%20the%20Universal%20Unique%20Identifier%20(UUID).>, 5<https://www.warp10.io/content/03_Documentation/05_Security/03_Token_Management#:~:text=Each%20owner%20is%20identified%20by%20a%20UUID.>]

UTM System Assigned UUID (Type 3)

  *   Definition: A random, temporary ID assigned by a UAS Service Supplier (USS) to a specific operation.
  *   Purpose: Primarily for managing identification during a single flight, often to protect operator privacy.
  *   Characteristics:
     *   Generation: Follows RFC 4122 (UUID v4).
     *   Trust: Does not inherently prove that the UAS broadcasting the ID is actually the one authorized to use it (susceptible to spoofing unless combined with other security measures).
     *   Use Case: Ideal for temporary operational, anonymous IDs. [6<https://www.ietf.org/archive/id/draft-ietf-drip-arch-00.html>, 7<https://grahamsutton.dev/laravel-prefixed-ulids-generate-stripe-style-obfuscated-ids-for-your-app/#:~:text=Unlike%20UUIDs%2C%20which%20you%20are%20probably%20more,create%20a%20unique%20ID%20that%20is%20sortable.>, 8<https://www.hjp.at/doc/rfc/rfc9153.html#:~:text=USS%20also%20serve%20as%20the%20principal%2C%20or,its%20operator%20in%20at%20least%20one%20USS.>, 9<https://www.federalregister.gov/documents/2019/12/31/2019-28100/remote-identification-of-unmanned-aircraft-systems#:~:text=A%20session%20ID%20would%20be%20a%20randomly%2Dgenerated,to%20provide%20a%20greater%20level%20of%20privacy.>, 10<https://par.nsf.gov/servlets/purl/10213236#:~:text=As%20a%20result%2C%20it%20is%20vulnerable%20to,airspace%20with%20one%20or%20more%20fake%20identities.>]
IETF DRIP Entity Tag (DET)

  *   Definition: A 128-bit Hierarchical Host Identity Tag (HHIT) used specifically in UAS Remote Identification.
  *   Purpose: To make Remote ID instantly actionable, secure, and trustable (non-repudiable) even in offline/broadcast scenarios.
  *   Characteristics:
     *   Cryptographic: DETs are derived from public keys.
     *   Verifiable: An observer can verify the UAS holds the corresponding private key, proving the ID is not spoofed.
     *   Hierarchical: Contains structure (Hierarchy ID) enabling discovery of the registry where the drone is registered via DNS.
     *   Statistically Unique: Uses second-preimage resistance for uniqueness.
     *   Use Case: Critical infrastructure requiring high security, trust, and accountability. [1<https://datatracker.ietf.org/doc/rfc9374/>, 11<https://www.ietf.org/archive/id/draft-wiethuechter-drip-det-tada-01.html#:~:text=Abstract.%20This%20document%20standardizes%20usage%20of%20Drone,accountability%2C%20and%20encryption%20key%20IDs%20for%20confidentiality.>, 12<https://tex2e.github.io/rfc-translater/html/rfc9374.html#:~:text=This%20RFC%20is%20a%20foundational%20document%20of,%5BRFC9224%5D)%20for%203rd%2Dparty%20identification%20endorsement%20(e.g.%2C%20%5BDRIP%2DAUTH%5D).>, 13<https://www.rfc-editor.org/rfc/rfc9153.html>, 14<https://www.ietf.org/archive/id/draft-ietf-drip-arch-22.html>, 15<https://www.ietf.org/archive/id/draft-ietf-drip-reqs-03.html>]
Key Comparison
Feature [1<https://datatracker.ietf.org/doc/rfc9374/>, 11<https://www.ietf.org/archive/id/draft-wiethuechter-drip-det-tada-01.html#:~:text=Abstract.%20This%20document%20standardizes%20usage%20of%20Drone,accountability%2C%20and%20encryption%20key%20IDs%20for%20confidentiality.>, 14<https://www.ietf.org/archive/id/draft-ietf-drip-arch-22.html>, 16<https://www.ietf.org/archive/id/draft-ietf-drip-reqs-00.html>, 17<https://www.rfc-editor.org/rfc/rfc9374.pdf>, 18<https://datatracker.ietf.org/doc/html/draft-card-drip-arch-02>]
UTM Assigned UUID
IETF DRIP Entity Tag (DET)
Type
Generic UUID (v4)
Cryptographic Hash (HHIT)
Trust Model
Trust by registration
Trust by verification (Cryptographic)
Non-spoofable
No (without external signing)
Yes (when combined with AUTH)
Hierarchy
None (Flat)
Yes (contains RAA/HDA)
Length
128 bits
128 bits (represented as IPv6)
Registry Lookup
Requires proprietary database
DNS-based
Primary Value
Privacy/Temporary
Security/Trustworthy

Summary

While a UTM-assigned UUID is a simple label, a DET is a self-asserting identifier that allows observers to verify the identity and, via DNS, check its registration status, even without an active internet connection at the time of observation. The IETF DRIP architecture leverages DETs to provide a secure alternative to simple random, non-cryptographic IDs. [2<http://www.diva-portal.org/smash/record.jsf?pid=diva2:1851520>, 15<https://www.ietf.org/archive/id/draft-ietf-drip-reqs-03.html>, 19<https://datatracker.ietf.org/doc/draft-ietf-drip-rid/37/#:~:text=Gurtov%20Link%C3%B6ping%20University%202%20December%202022%20DRIP,RID).%20This%20document%20updates%20RFC7401%20and%20RFC7343.>, 20<https://www.mdpi.com/2079-9292/13/12/2370#:~:text=DT%20classifies%20nodes%20based%20on%20attributes%20or,users%20and%20detecting%20spoofing%20across%20various%20scenarios.>, 21<https://ieeexplore.ieee.org/document/10467167/#:~:text=However%2C%20the%20Internet%20Engineering%20Task%20Force%20(IETF,without%20needing%20an%20external%2C%20internet%2Dbased%20verification%20service.>]

AI responses may include mistakes.
[1] https://datatracker.ietf.org/doc/rfc9374/
[2] http://www.diva-portal.org/smash/record.jsf?pid=diva2:1851520
[3] https://www.ietf.org/archive/id/draft-ietf-drip-arch-31.html
[4] https://www.privado.id/blog/privado-id-launches-identity-verification-for-apps-in-app-zero-install-human-verification-50-faster<https://www.privado.id/blog/privado-id-launches-identity-verification-for-apps-in-app-zero-install-human-verification-50-faster#:~:text=Is%20cryptographically%20derived%20from%20the%20Universal%20Unique%20Identifier%20(UUID).>
[5] https://www.warp10.io/content/03_Documentation/05_Security/03_Token_Management<https://www.warp10.io/content/03_Documentation/05_Security/03_Token_Management#:~:text=Each%20owner%20is%20identified%20by%20a%20UUID.>
[6] https://www.ietf.org/archive/id/draft-ietf-drip-arch-00.html
[7] https://grahamsutton.dev/laravel-prefixed-ulids-generate-stripe-style-obfuscated-ids-for-your-app/<https://grahamsutton.dev/laravel-prefixed-ulids-generate-stripe-style-obfuscated-ids-for-your-app/#:~:text=Unlike%20UUIDs%2C%20which%20you%20are%20probably%20more,create%20a%20unique%20ID%20that%20is%20sortable.>
[8] https://www.hjp.at/doc/rfc/rfc9153.html<https://www.hjp.at/doc/rfc/rfc9153.html#:~:text=USS%20also%20serve%20as%20the%20principal%2C%20or,its%20operator%20in%20at%20least%20one%20USS.>
[9] https://www.federalregister.gov/documents/2019/12/31/2019-28100/remote-identification-of-unmanned-aircraft-systems<https://www.federalregister.gov/documents/2019/12/31/2019-28100/remote-identification-of-unmanned-aircraft-systems#:~:text=A%20session%20ID%20would%20be%20a%20randomly%2Dgenerated,to%20provide%20a%20greater%20level%20of%20privacy.>
[10] https://par.nsf.gov/servlets/purl/10213236<https://par.nsf.gov/servlets/purl/10213236#:~:text=As%20a%20result%2C%20it%20is%20vulnerable%20to,airspace%20with%20one%20or%20more%20fake%20identities.>
[11] https://www.ietf.org/archive/id/draft-wiethuechter-drip-det-tada-01.html<https://www.ietf.org/archive/id/draft-wiethuechter-drip-det-tada-01.html#:~:text=Abstract.%20This%20document%20standardizes%20usage%20of%20Drone,accountability%2C%20and%20encryption%20key%20IDs%20for%20confidentiality.>
[12] https://tex2e.github.io/rfc-translater/html/rfc9374.html<https://tex2e.github.io/rfc-translater/html/rfc9374.html#:~:text=This%20RFC%20is%20a%20foundational%20document%20of,%5BRFC9224%5D)%20for%203rd%2Dparty%20identification%20endorsement%20(e.g.%2C%20%5BDRIP%2DAUTH%5D).>
[13] https://www.rfc-editor.org/rfc/rfc9153.html
[14] https://www.ietf.org/archive/id/draft-ietf-drip-arch-22.html
[15] https://www.ietf.org/archive/id/draft-ietf-drip-reqs-03.html
[16] https://www.ietf.org/archive/id/draft-ietf-drip-reqs-00.html
[17] https://www.rfc-editor.org/rfc/rfc9374.pdf
[18] https://datatracker.ietf.org/doc/html/draft-card-drip-arch-02
[19] https://datatracker.ietf.org/doc/draft-ietf-drip-rid/37/<https://datatracker.ietf.org/doc/draft-ietf-drip-rid/37/#:~:text=Gurtov%20Link%C3%B6ping%20University%202%20December%202022%20DRIP,RID).%20This%20document%20updates%20RFC7401%20and%20RFC7343.>
[20] https://www.mdpi.com/2079-9292/13/12/2370<https://www.mdpi.com/2079-9292/13/12/2370#:~:text=DT%20classifies%20nodes%20based%20on%20attributes%20or,users%20and%20detecting%20spoofing%20across%20various%20scenarios.>
[21] https://ieeexplore.ieee.org/document/10467167/<https://ieeexplore.ieee.org/document/10467167/#:~:text=However%2C%20the%20Internet%20Engineering%20Task%20Force%20(IETF,without%20needing%20an%20external%2C%20internet%2Dbased%20verification%20service.>




From: Stu Card <stu.card@axenterprize.com>
Sent: Tuesday, February 24, 2026 1:24 PM
To: DRIP WG <tm-rid@ietf.org>
Subject: [Drip] Google's "AI" is mostly right & positive about DETs

Google this and be happy with the “AI Overview”. 😊

UTM system assigned UUID vs IETF DRIP Entity Tag