Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Identity proofs #134

Open
aumetra opened this issue Mar 29, 2023 · 4 comments
Open

Identity proofs #134

aumetra opened this issue Mar 29, 2023 · 4 comments
Labels
enhancement New feature or request exploration Exploration of new ideas

Comments

@aumetra
Copy link
Member

aumetra commented Mar 29, 2023

There is FEP-C390 that describes identity proofs based on DIDs that are linked to actors, practically allowing somewhat nomadic identities by providing proofs that all of these different accounts are indeed one and the same person.
It's not complete yet but definitely an interesting point for exploration.

One thing I'm not entirely fond of is the forced usage of Base58 for the key methods as defined in the did:key Method draft v0.7. Since it is still experimental, I will take the liberty and ignore the Base58 requirement.
Since the draft also defines usage of Multibase and Multicodec, means a relaxation of this requirement will still be backwards compatible with already existing DIDs. It will only present an issue if Kitsune would use a different encoding than Base58 and an existing implementation tried to retrieve the verifying key material.

@aumetra aumetra added enhancement New feature or request exploration Exploration of new ideas labels Mar 29, 2023
@erlend-sh
Copy link

erlend-sh commented Oct 12, 2023

Nomadic Identity discussions on SocialHub:

Example implementation of fep-c390: https://codeberg.org/silverpill/mitra

Implementing this fep for Kitsune to be compatible with Mitra would set a strong precedent for a stable fep proposal, ready for wider adoption.


Two new FEPs related to nomadic identity and data portability:

@erlend-sh
Copy link

Matrix also has a long-standing discussion evaluating different forms of nomadic identity, recently narrowing in on DIDs:

@erlend-sh
Copy link

It’s also worth following ATproto’s own development of this feature:

In response to doubts about using Bluesky as a reference, I’ve said the following:

While I agree that there’s every reason to be cautious about Bluesky’s centralized approach, I think it’s worth noting that private-key identities solve two distinct problems:

  1. Instance-independent identity with credible exit
  2. Self-sovereign identity with no 3rd party authority

Personally I don’t actually want to be 100% responsible for the safeguarding of my private identity key, for the same reason I use a bank instead of storing my money in a safe at home.

I want to fully own my identity, but I don’t need exclusive custodianship over it. I have a much more urgent need for (1) than (2), so I’m okay with solving the former first as long as there’s a clear path from there to the latter.

Bluesky’s approach is in principle fine with me, provided their promise of credible exit can be substantiated. However I might only be willing to trust such a third party if it was Mozilla or some other similarly established open-web institution.

@erlend-sh
Copy link

OIDC also has a draft spec extension taking DIDs into account:
https://openid.net/specs/openid-connect-self-issued-v2-1_0.html

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request exploration Exploration of new ideas
Projects
None yet
Development

No branches or pull requests

2 participants