You can also Gordian Envelopes to improve the resiliency of your digital assets using a multi-permit authentication system, that works with symmetric secrets, public keys, advanced permits like quorum of shares, and even multiple permits at the same time. [4/11]
Our Gordian Envelopes offer a more privacy-focused encoding architecture than existing data formats such as JWT and JSON-LD. We believe it has a better security architecture than JWT and doesn’t fall victim to barriers of canonicalization complexity found in JSON-LD. [3/11]
Real-world envelopes can do many more things. They can include special instructions, be locked and/or offer tamper-evident authentication seals from their creator. They can even have windows to show some of the material inside, which are selectively opaque or transparent. [2/11]
Some context on our new privacy tech from @BlockchainComns: We chose the “Envelope” as the core metaphor for these Smart Documents because they can privately contain & route plain text, encrypted text, small amounts of data or large, certificates, and much more!🧵[1/11] https://twitter.com/BlockchainComns/status/1588245396932857857
Or if you prefer a video, this 10-minute short also gives a high-level overview: [8/11] https://youtu.be/tQ9SPek0mnI
Read our “An Introduction to Gordian Envelope” for a broad, high-level overview. [7/11] dhttps://www.blockchaincommons.com/introduction/Envelope-Intro/
Alternatively, use Gordian Envelopes to protect your anonymity with proofs of inclusion and herd privacy techniques. [6/11] https://github.com/BlockchainCommons/BCSwiftSecureComponents/blob/master/Docs/10-EXISTENCE-PROOFS.md
You can use Gordian Envelope to selectively redact information, even if you’re not the source of that information. This gives users more choice about what information they wish to reveal when they present details issued by others about themselves. [5/11] https://github.com/BlockchainCommons/BCSwiftSecureComponents/blob/master/Docs/09-ELISION-REDACTION.md
Support this work on foundational specifications by becoming a sponsor of Blockchain Commons! [11/11] https://github.com/sponsors/BlockchainCommons
Or if you prefer videos, this playlist offers yet another deep dive with examples and demos of all the major features of Gordian Envelopes. [10/11] https://youtube.com/playlist?list=PLCkrqxOY1FbooYwJ7ZhpJ_QQk8Az1aCnG
If you are an engineer, our “Tech Intro” offers a good starting point for a deeper dive into the construction of Envelopes, with many links to other resources. [9/11] https://github.com/BlockchainCommons/Gordian/blob/master/Docs/Envelope-Tech-Intro.md
I’m thrilled to see the first #RWOT11 paper from our September collaborative workshop in The Hague “Taking out the CRUD” from a team led by @Kate_Sills… https://twitter.com/RWOTEvents/status/1588254274529636358
#RebootingWebOfTrust has been ongoing since 2015. Our goal: a global collaboration to empower individuals to co-create decentralized systems for lasting mutual benefit. https://www.WebOfTrust.info
This is the first #RebootingWebOfTrust we’ve had in three years due to COVID. It was a great success with over 70 participants and more than a dozen more collaborative papers in progress: https://github.com/WebOfTrustInfo/rwot11-the-hague/tree/master/draft-documents
The paper, which covers 5 potential threats when using Decentralized Identifiers (#DIDs), has already had a real-world impact with a PR to did:ethr: https://twitter.com/mirceanistor/status/1588546570982522880
We’re returning to the United States in 2023! Sign up for our mailing list to learn about our next event, #RWOT12 in Los Angeles event planned for March: https://www.weboftrust.info/subscribe/
No masks <sigh>
Replying to @LanceRootsID
I’d be interested in your thoughts on our hash-tree selective disclosure approach: https://github.com/BlockchainCommons/WIPs-IETF-draft-envelope
Replying to @drummondreed, @kristinayasuda and @Microsoft
We are also doing different salts in our approach to hash-based selective disclosure. I’d be interested in a better understanding of correlation risks using salts: https://github.com/BlockchainCommons/WIPs-IETF-draft-envelope
Replying to @tlodderstedt and @kristinayasuda
I’d be interested in your thoughts on our alternative: https://github.com/BlockchainCommons/WIPs-IETF-draft-envelope
Are they doing some deterministic salts? from our security considerations: https://blockchaincommons.github.io/WIPs-IETF-draft-envelope/draft-mcnally-envelope.html
I agree that the randomness requirements for salts have to be higher than that for nonces. But I’d love any thoughts on how to offer more detail on this for our security considerations.
Why from a root nonce?
We’ve elected so far to use salts individually, not derived from a root because our form of VC (equivalent, not to standards) can be large aggregates. For instance, for herd privacy there could be one proof for whole graduating class, with existence proofs offered to students.
If the salt is from a root, all interior envelopes have to be created at same time, whereas in business reality (and multisig) the may be done at different times.
See video on elision in Gordian Envelopes https://youtu.be/3G70mUYQB18
…and on existence proofs: https://youtu.be/LUQ-n9EZa0U
Similarly we wanted an alternative to CL Sigs & BBS+ proofs as a base functionality. Not that those and other zk-proofs don’t have their place (I like bulletproofs) but we believe that they can be offered in addition to the basic functionality.
There also was a desire to be able to include encrypted objects that didn’t change the signature, or external references.
We are using envelopes for a lot more than VC or DID like structures. Here it is being used for seed sharding (social key recovery): https://github.com/BlockchainCommons/Gordian/blob/master/Docs/Envelope-Use-Cases-Assets.md
Fundamentally, you can create authenticated educational credentials with Gordian Envelopes. Great, everyone can do that. [2/9] https://github.com/BlockchainCommons/Gordian/blob/master/Docs/Envelope-Use-Cases-Educational.md#1-danika-proves-her-worth-credentials-signature
Smart Documents using our Gordian Envelope specs remain one of the top priorities at @BlockchainComns, so for #IIW week, I wanted to talk about some of the identity use cases by looking at educational credentials. [1/9] https://github.com/BlockchainCommons/Gordian/blob/master/Docs/Envelope-Use-Cases-Educational.md
Finally, the incorporation of credentials into large sets allows for herd privacy, such as a single one for a whole graduating class. This can protect them even from the issuer: users can decide when and if they ever reveal them! [6/9] https://github.com/BlockchainCommons/Gordian/blob/master/Docs/Envelope-Use-Cases-Educational.md#5-paul-privately-proves-proficiency-herd-privacy
Credentials don’t have to be offered by centralized or established authorities: peer-to-peer credentials are also possible with Gordian Envelopes! [5/9] https://github.com/BlockchainCommons/Gordian/blob/master/Docs/Envelope-Use-Cases-Educational.md#part-two-web-of-trust-credentials
That’s just the beginning, other holders can also repackage a Gordian Envelope, with their own elision and add their own credential endorsements. [4/9] https://github.com/BlockchainCommons/Gordian/blob/master/Docs/Envelope-Use-Cases-Educational.md#3-thunder–lightning-spotlights-danika-third-party–repackaging
The power of the Gordian Envelope comes from the fact that anyone can elide data, not just the issuer. Worried about discrimination because of your name, like Danika in our example? Just elide it out and the credential remains valid. [3/9] https://github.com/BlockchainCommons/Gordian/blob/master/Docs/Envelope-Use-Cases-Educational.md#2-danika-restricts-her-revelations-elision
Contact me if you’d like to become involved. You can also support the future development of interoperable specs like these by becoming a Blockchain Commons supporter! [9/9] https://github.com/sponsors/BlockchainCommons
Our intro to envelopes covers the topic generally. [8/9] https://github.com/BlockchainCommons/Gordian/blob/master/Docs/Envelope-Intro.md
Generally, Gordian Envelopes offer many features that we think are innovative and could offer improvements for decentralized identity uses. Elision, peer-to-peer credentialing, and herd privacy are some of the most notable! [7/9]
Replying to @codenamedmitri
It looks there are now multiple hash-based selective-disclosure approaches: in mDL, in SD-JWT, JSON-LD Merkle Disclosure (I’m not sure if ACDC offers it). Some interesting difference: first three are hash-lists, whereas Gordian Envelope does hash-trees, which has som efficiency…
Replying to @codenamedmitri
SD-JWT has a root salt that derives child salts, which does save on space, but makes multiple signatures much harder. Gordian Envelopes offers optional salts for each entry, at multiple levels, because sometimes correlation of hashes IS desirable.
Replying to @codenamedmitri
A particular feature that none of the other formats offers is support for non-VC structures, such as very large “herd privacy” structures. For instance a single VC for a large graduating class, or other large cohorts, where instead of a VC to students they get an existence proof.
RT @chrisheuer: Great session leading to action at #iiw New group working to #endsurveillancecapitalism Stop tracking us, stop manipulating…
List of deceptive language compiled at #IIW. In particular today I feel the #DarkPattern “CONSENT:
Sign indemnification contract with us from any potential liability without knowing what you sign.” https://twitter.com/_nat_en/status/1593050322767056898
RT @moskovich: @pujaohlhaver We’re working on this collaborative model for custody with @BlockchainComns. You should check out their work h…
Replying to @moskovich, @pujaohlhaver and @BlockchainComns
Collaborative Seed Recovery, or CSR, is a new system intended to automate the recovery of seeds and other sensitive digital data in a way that is safe, secure, and simple to use. https://github.com/BlockchainCommons/Gordian/blob/master/Docs/CSR.md