Skip to content
Pomcor

Pomcor

Research on web and mobile technology

  • Home
  • Blog
  • Developers
    • PJCL Library
    • Demonstrations
  • Research
    • Cryptographic Authentication
    • TLS Traffic Visibility
    • Cardholder Authentication
    • Remote Identity Proofing
    • Cryptographic Modules
    • Derived Credentials
    • Archived Research Pages
  • Patents
  • About Us
    • Company
    • People
    • Contact
  • Archive
Pomcor

Tag: Privacy

A Proposed Architecture for the NSTIC Ecosystem

NSTIC has very ambitious privacy goals. Today’s third-party login
solutions do not come close to meeting them. Privacy-enhancing
technologies that could meet them have yet to be deployed
successfully. And Facebook’s social login is preempting the
password-reduction benefit of NSTIC while severely reducing privacy.
Can NSTIC succeed?

We believe that the key to success is to build privacy-enhancing
technologies into the fabric of the Web, so that little effort is
required of users, relying parties, identity providers and social
sites to take advantage of them. In the white paper

  • A
    Proposed Architecture for the NSTIC Ecosystem

we propose an NSTIC architecture based on extensions of two core
protocols of the Web, TLS and HTTP, and we describe a range of use
cases to show how it meets the goals of NSTIC.

The paper is still a first draft, and we hope you’ll help us improve
it by leaving your comments below.

Author Francisco CorellaPosted on July 17, 2011March 21, 2025Categories Authentication, Network Security Protocols, PrivacyTags Authentication, Facebook, Identity, Network Security Protocols, NSTIC, Privacy, Social Login2 Comments on A Proposed Architecture for the NSTIC Ecosystem

Must the Site know the Application in a Social Login?

I’m back in San Diego after participating with Karen in the Internet
Identity Workshop
that took place last week in Mountain View. It was
a great workshop, with many in-depth discussions of a broad range of
topics. The most interesting ones for me were those concerning
NSTIC.

I convened the session “How to meet privacy goals of NSTIC” where I
presented the contents of the white paper “Achieving the Privacy Goals
of NSTIC in the Short Term
” and showed companion PowerPoint slides
illustrating protocol steps.

There was a lively discussion. One of the points that were debated
was whether a Web application that acts as relying party in a social
login scenario (e.g. by featuring a button “Log in with Facebook”),
could and/or should remain anonymous with respect to the social site
(e.g. Facebook). Social login combines authentication and
authorization, and the application not only is provided with the
user’s identity relative to the social site, but also is given a level
of access to the user’s account at the site.

Some people argued that the social site has to protect the user
against malicious applications, and must therefore register
applications that want to act as relying parties, so that it can
revoke the registration of an application that misbehaves. I argued
that the user should be allowed to take responsibility for the
applications he or she wants to use, that requiring registration gives
the social site too much power over applications, and that the
identity of the relying party should not be revealed to the social
site as a matter of user privacy.

This is an important debate that will no doubt continue. It
highlights the contrast between current technology and one of the privacy
goals of NSTIC.

Author Francisco CorellaPosted on May 9, 2011March 21, 2025Categories Authentication, Network Security Protocols, PrivacyTags Authentication, Identity, Network Security Protocols, NSTIC, Privacy, Social Login

Social Login without Application Registration

Tonight I’m in Washington DC with Karen Lewison for the NIST IDTrust workshop, which takes place tomorrow and the day after (April 6-7). We’ll be showing a poster on PKAuth, our proposed social login protocol. By social login I mean the buttons that allow you to log in to Web applications with your identity at a social network such as Facebook, LinkedIn or Twitter, giving the application access to your social context at the site. I believe the term social login was coined by Janrain.

Today social login uses the OAuth protocol, which requires prior registration of the application with the social site. The registration process establishes a shared secret that the site later uses to authenticate the application, and provides the site with information that it later uses to identify the application to the user at it asks permission to grant the application access to the user’s social context.

The problem with that is that the social site gains the power to disable the application by revoking its registration. Why is that a problem? Because social login is becoming so popular that the day may come when all applications have to register with the dominant social site (currently Facebook) just to be able to authenticate their users. The dominant social site will then have the power to disable any Web application by revoking its registration. That would be bad for users, for applications, and for the dominant social site itself, which would no doubt face registration by multiple governments.

That’s why we are proposing PKAuth. In PKAuth registration is optional. A site will be able to require registration for special applications that need, say, administrative access to the user’s account, while not requiring it for others. Applications that only want to delegate user authentication should not have to register.

Instead of registration, PKAuth relies on the Web’s public key infrastructure, using the application’s ordinary SSL certificate to authenticate the application and identify it to the user.

We have just published a revised version of the PKAuth white paper and I will be talking about other benefits of PKAuth in future posts.

Author Francisco CorellaPosted on April 5, 2011March 21, 2025Categories Authentication, Network Security Protocols, PrivacyTags Authentication, Facebook, Identity, Network Security Protocols, OAuth, PKAuth, Privacy, Social Login

Posts pagination

Previous page Page 1 … Page 3 Page 4

RSS Feeds

RSS logo Subscribe to blog posts

RSS logo Subscribe to comments

Recent Blog Posts

  • Using a browser as a credential wallet
  • A Definition of Special Soundness Better Suited for Anonymous Credentials
  • Overview of ISO/IEC 18013-5: Innovations and Vulnerabilities in the mDL Standard
  • A Streamlined Process for Licensing a Cryptographic Authentication Patent
  • A Demonstration of Two-Factor Cryptographic Authentication with a Familiar User Experience

Blog Post Categories

Blog Post Tags

  • 3DS2
  • Authentication
  • Biometrics
  • CAC
  • Cryptography
  • Cybersecurity
  • Data Protection
  • Derived Credentials
  • Facebook
  • Formal Methods
  • HCI
  • Identity
  • Identity Proofing
  • IIW
  • Integrity Protection
  • JavaScript
  • Karatsuba
  • Mobile
  • MongoDB
  • Multifactor
  • Network Security Protocols
  • NIST
  • NodeJS
  • NSTIC
  • Omission-Tolerant Checksum
  • OpenID
  • OpenID Connect
  • Patents
  • Payments
  • PIV
  • PJCL
  • PKAuth
  • Privacy
  • Provable Security
  • Real Time
  • Search
  • Selective Disclosure
  • Smart Cards
  • Social Login
  • Surveillance
  • TEE
  • TLS
  • Typed Hash Trees
  • Usability
  • User Experience
  • Home
  • Blog
  • Developers
    • PJCL Library
    • Demonstrations
  • Research
    • Cryptographic Authentication
    • TLS Traffic Visibility
    • Cardholder Authentication
    • Remote Identity Proofing
    • Cryptographic Modules
    • Derived Credentials
    • Archived Research Pages
  • Patents
  • About Us
    • Company
    • People
    • Contact
  • Archive
Pomcor Proudly powered by WordPress