| ▲ | Privacy-preserving age and identity verification via anonymous credentials(blog.cryptographyengineering.com) | ||||||||||||||||
| 41 points by FrasiertheLion 4 hours ago | 14 comments | |||||||||||||||||
| ▲ | lachiflippi an hour ago | parent | next [-] | ||||||||||||||||
I've been really enjoying all these articles proposing solutions to anonymous age verification, mainly because most of them are written as if this has never been implemented in the real world. German IDs support age verification that just returns a yes/no response to the question "is this user above the age of 18," and not a single service in the entire country supports it. Anonymous age verification isn't a technical problem to be solved, as it's already been solved, it's a societal problem in that either the companies or the politicians pushing for age verification don't want to support it. | |||||||||||||||||
| |||||||||||||||||
| ▲ | chocmake 17 minutes ago | parent | prev | next [-] | ||||||||||||||||
There's a good explainer and Q&A of BBS+[1], which is one such zero-knowledge anonymous credentials standard, in a joint talk by cryptographer Brent Zundel. It covers the history of getting it into the W3C verified crentials spec and how various competing verified credential standards aren't privacy-preserving or as performant. It seems very promising and has considered various pitfalls. From what I understand the issuer signs a credential and then the user on their local device generates unique proofs based on the signature each time, preventing verifiers from colluding/tracking the original signature across services. It also seems to be designed with safeguards against the issuer. Info based on credentials can be selectively disclosed like whether you're over 18 or whether you have above a certain threshold in an account without disclosing the underlying data. Obviously if the type of services you use need literal PII then they can still tie activity to a real-world identity but for services only requiring age assurance being able to prove you're over 18 without providing the actual age or other identifiers is better than solutions being actively used. | |||||||||||||||||
| ▲ | imglorp an hour ago | parent | prev | next [-] | ||||||||||||||||
We all know these laws are about suppressing dissent and not about age. If anyone implemented this privacy preservation scheme, would all the laws flip to say "yeah we really did mean it govt id tied to your post". | |||||||||||||||||
| |||||||||||||||||
| ▲ | screwt an hour ago | parent | prev | next [-] | ||||||||||||||||
This article is a great explainer of the basics underlying anonymous credentials. I look forward to the promised follow-up explaining real-world examples. The key issue however is trust. The underlying protocols may support zero-knowledge proofs. But as a user I'm unlikely to be able to inspect those underlying protocols. I need to be able to see exactly what information I'm allowing the Issuer to see. Otherwise a "correct" anonymous scheme is indistinguishable from a "bad" scheme whereby the Issue sees both my full ID and details of the Resource I wish to access. Assuming a small set of centralized Issuers, they are in a position of great power if they can see exactly who is trying to access exactly what at all times. That's the question of trust - trust in the Issuer and in the implementation, not the underlying math. | |||||||||||||||||
| |||||||||||||||||
| ▲ | TekMol 2 hours ago | parent | prev | next [-] | ||||||||||||||||
I only skimmed the article, but the proposed solution seems to be that the authority (the "issuer") sends data to a device the user owns but has no control over. Like an Android or iOS phone. The data is of such form that the phone then can pass challenges of type "are you of at least x years old" without giving out any other information. And the user cannot share that data with other users because their phone will not let them. | |||||||||||||||||
| ▲ | rapnie 2 hours ago | parent | prev | next [-] | ||||||||||||||||
Note that there is a broken link to "great paper" in: > These techniques are described in a great paper whose title I’ve stolen for this section. | |||||||||||||||||
| |||||||||||||||||
| ▲ | tatersolid 3 hours ago | parent | prev [-] | ||||||||||||||||
Title has been modified by this submission. Actual title of article is Anonymous credentials: an illustrated primer. | |||||||||||||||||
| |||||||||||||||||