SlideShare une entreprise Scribd logo
1  sur  49
Télécharger pour lire hors ligne
Attacking Decentralized
Identity
Gabe Cohen, TBD / Block
Brent Zundel, Gen
Crypto & Privacy Village, DEFCON 31
August 11, 2023
What is
Decentralized
Identity,
anyway?
2
The Evolution of Digital Identity
Identity Model Centralized Federated Decentralized
Technology
● ID/Password
● Multi-factor Auth
● SSO
● OAuth
● OpenID
● SAML
● Secure Personal
Storage
● SIOP, Web5
● Cryptographically
driven auth
Characteristics
● Identity fragmented
across many service
providers
● Corps have full control
of user data
● Centralized data
providers at risk for
attack
● Rely on a single/set of
centralized identity
providers
● Identity information
fragmented between IdPs
● Centralized data
providers at risk for
attack
● Identity portable across
ecosystems
● User controlled data
on-device or
user-controlled cloud
● Users are in control of
their data
4
SSI Principles
● Existence – Users must have an independent existence
● Control – Users must control their identities
● Access – Users must have access to their own data
● Transparency – Systems and algorithms must be transparent
● Persistence – Identities must be long lived
● Portability – Information and services about identity must be
transportable
● Interoperability – Identities should be as widely usable as
possible
● Consent – Users must agree to the use of their identity
● Minimalization – Disclosure of claims must be minimized
● Protection – The rights of users must be protected
Why Decentralize?
5
6
SSI
Standards
Landscape
W3C Verifiable Credentials
(VCs)
A Verifiable Credential is a W3C standard
mechanism of expressing claims about an
individual on the Web in a way that is
cryptographically secure, privacy respecting,
and machine-verifiable.
A VC is inherently independently verifiable –
which means a verifier will never need to go
back to the issuer to conduct or complete
verification.
7
Claims can include, but aren’t limited to, the same
claims in traditional credentials such as health cards,
passports, university degrees, or business licenses.
Holder
The entity controlling a VC. This entity is
usually the subject of the VC, though not always.
There are scenarios where the entity may have been
issued a VC, but is not the subject of the VC.
8
Issuer
The issuing entity of a VC. This entity asserts claims
about the subject of the VC and issues it to a Holder.
Verifier
The entity to which a VC is presented to as proof
of a claim or set of claims. This entity might
request a VC, and then verify that the VC satisfies
their requirements.
Actors in Decentralized
Identity Systems
W3C Decentralized Identifiers
(DIDs)
A Decentralized Identifier W3C standard for a
type of user- or business-controlled
identifier that enables verifiable,
decentralized digital identity on the Web.
DIDs are URIs that associate a DID subject
with a DID document allowing trustable
interactions with that subject. DID documents
contain public keys and other data.
9
A DID can refer to any subject, including a
person, organization, thing, data model, abstract
entity, etc.
10
An Ecosystem of
Decentralized Interactions
Cool cool.
Who’s using
this stuff?
11
Decentralized Identity:
In the Numbers
60+
Public & private companies
building in the space
40+
Countries using some form of
Decentralized Identity
12
3B+
Verifiable Credentials
Issued
13
Decentralized Identity:
In the Logos
75%+ of the world
will be using
decentralized
identity tech
within the next 5
years
14
“
“Decentralized identity is important for confirming user identities
and securely storing them. It offers numerous advantages separate
of the greater identity autonomy it delivers to customers.”1
“…passkeys do not protect our privacy or give us complete control of
our online identities. For that to happen, we need to look at
self-sovereign identity (SSI).”3
“Individuals can own and manage their own tamper-proof credentials
for applications such as personal health, education, and voting
records in an encrypted digital wallet on their personal devices.”2
Attack Surface
16
Service Providers Networks User Agents Individual Entities
Companies like
Microsoft, Ping
Identity, Okta, MATTR,
Trinsic, and more.
Their service offering
= your opportunity!
EBSI, Velocity,
Sovrin, Indicio,
Cheqd, and others.
Networks are forming
to standardize,
monetize, and
facilitate identity
Your phone, your
computer, your
applications.
You thought being your
own bank was hard, how
about being your own
IdP?
You, your mom, your
dog, your employer,
your trustworthy local
politician.
In a world of
decentralized trust,
each entity is an
entrypoint for
exploit.
That
vulnerability
is just my
type!
17
18
Vuln #1:
Gimme That
Data!
●
In a world with verifiable data, any data can be
requested by anyone at any time…
○ Why is this data being requested? Is there
other less sensitive data that would
suffice?
○ Is the requester who they claim to be? How
do you know?
○ Is the requester the right entity to
receive and handle this data?
○ What can be done with this data in other
contexts? What’s protecting the data from
unauthorized usage?
Attack #1: Abuse of Trust
19
Alice goes to the store…
1. Store requests proof that Alice is
over 18
2. Alice scans a QR code with her digital
identity app
3. Alice selects which credential matches
the request
4. Alice has an option to submit
Attack #2: Confused Trust
Alice goes to open a bank account…
1. Alice navigates to a bank’s website
and clicks “sign up”
2. Alice is asked for a few pieces of
information
a. Government issued ID
b. Proof of employment
c. Proof of funds to open the
account
The website appears legitimate, and her
app thinks so too, does Alice send over
the data?
20
21
Vuln #2:
You thought
distributed
systems
were hard…
●
In a distributed systems, usually…
● You’re aware of all nodes in the system
● Consistency ensures that all nodes in the system
have the same up-to-date view of data
In a decentralized system…
● There is no one method of decentralized
consistency
○ Strongly consistent (BTC)
○ Eventually consistent (IPNS)
● Even with consistency, you may not always know
if you have the latest state
Attack #3: Data (Un)availability
Bob goes to verify a credential
22
did:jwk
(+) Self-resolving key that
always has the latest state
(-) No updates
(-) No way to signal
compromise
did:web
(+) Domain based method
(+) Supports updates
(-) Relies on TLS certs
(-) Relies on DNS / domain
registrars
(-) No historical state
resolution
23
did:ion
(+) Supports any DLT and
Content-Addressable Storage
(+) Permissionless + full
featured (update, recovery,
deactivation)
(-) Complex architecture
(-) Uncertain if you have
the latest state / pinning
risk
Attack #4: DIDn’t I tell you?
Vuln #3:
You want
to do WHAT
with your
data?
Attack #5: Heated Seat
Subscriptions
25
What You See What They See
Attack #6: Oops I centralized
again
Areas for Centralization
● DIDs
● Data storage / replication
● Verification of credentials
○ Status checks
○ Schema checks
● Wallets/agents
● Permissioned networks
● Payment networks
● SSI Suites (issuance/verification
services)
● Everywhere!
26
27
Vuln
#4,5,6:
Oh yeah,
those too…
Attack #7: The Semantic Web
Strikes Back
28
Attack #8: (Don’t) Roll Your Own
Crypto
29
Attack #9: Is AI going to
destroy decentralized trust?
30
Attack #10: Why are you hitting
yourself?
31
OK, now what?
32
Mitigation #1: Smart Agents
Digital Bodyguards = Freedom
Centralize When Necessary
● Trust needs to start somewhere
● Trusted issuers/verifiers →
centralized trust registries
○ What are they trusted for?
○ What have their last x
interactions been like?
○ Are there transparent reviews?
● Trusted vendors
○ Agents/wallets
○ Personal data stores
Take Privacy-First Stances
● Are you disclosing as little as
possible?
● What rights do you enforce after you
share?
33
Mitigation #2: More than a
green checkmark
Establish Trust; Minimize Disclosure
● Alice’s smart agent has a built-in Trust
Registry, and can now verify that requests
are legitimate
● Alice’s smart agent is able to advocate for
a privacy-preserving presentation mechanism,
selective disclosure
● ZKPs are coming!
● Make sure to authenticate, always
Is this enough?
34
Mitigation #3: Start From
First Principles
Decentralize where it matters most
● DID Method → If your DID method
isn’t decentralized and feature
rich, you’ve boxed yourself in
● DIDs → Use a mix of
public/long-lived and
private/ephemeral DIDs
● Providers → Make sure your data
isn’t locked to a single provider;
beware of single vendor solutions
Assert your rights
● Is it clear what you’re signing?
● What could go wrong?
● What are you giving up?
● Is there another path? 35
More Mitigations
● Build flexible, privacy-promoting standards
+ software
● User-defined terms of service/use to
enforce fair data usage
● Decentralized trust scoring mechanisms
(verified Google Reviews/Yelp)
● Use of open source software
● Use of open networks and ecosystems–say no
to walled gardens!
● More interactive protocols that enable user
negotiation & optionality
36
I
m
p
l
e
m
e
n
t
e
r
s
Individuals
O
r
g
a
n
i
z
a
t
i
o
n
s
Embracing
Decentralization For
Dummies
37
Choose Your Own Adventure
38
User
Control
Centralization Risk
(decreasing)
UX
(worsening)
Nerd Tools
Grandma
Tools
Land of Opportunity
Not Your Keys, Not Your Coins
→
Not Your DID, Not Your Data
39
Remember where we’re headed
40
Gabe Cohen : @decentralgabe : gabe@tbd.email
https://tbd.website
Brent Zundel : @brent_zundel : brent.zundel@gendigital.com
https://www.gendigital.com
Standards Links
● VCs w3.org/TR/vc-data-model/
● DIDs w3.org/TR/did-core/
● DID JWK github.com/quartzjer/did-jwk/
● DID Web w3c-ccg.github.io/did-method-web/
● Sidetree
identity.foundation/sidetree/spec/
● Presentation Exchange
identity.foundation/presentation-exchange/
● Trust Establishment
identity.foundation/trust-establishment/
● SD-JWT
datatracker.ietf.org/doc/draft-terbu-sd-jw
t-vc/02/
● JWP datatracker.ietf.org/wg/jwp/about/
● BBS
datatracker.ietf.org/doc/draft-irtf-cfrg-b
bs-signatures/
Get Involved
● DIF identity.foundation
● W3C VCWG w3.org/groups/wg/vc/
● W3C DIDWG w3.org/groups/wg/did/
● DIF Discord discord.gg/ZHxa4FQubB
● TBD Discord discord.gg/tbd
● Gen Twitter twitter.com/GenDigitalInc
● TBD Twitter twitter.com/TBD54566975
Slides: tinyurl.com/defcon31attackingdid
Attacking Decentralized
Identity
● What is Decentralized Identity anyway?
● That vulnerability is just my type
● Showing some real vulnerability
● Is nothing safe?
● Deployments
● Fin
What is Decentralized Identity Anyway?
● SSI Principles
● Verifiable Credentials
● Decentralized Identifiers
● Why would I even want that?
●
That vulnerability is just my type
● Private key compromise
● Validity vs verifiability
● Fake News!
● Blockchain problems
● Key management is hard
● Lack of Review
Showing some real vulnerability
● Some examples of attacks in the real world
● Ledger data breach
● How attackers might exploit vulnerabilities in decentralized identity systems
● The potential consequences of successful attacks
● Examples of real-world attacks on DIDs and verifiable credentials
Is nothing safe?
● Cryptographic techniques and key management practices to strengthen
security
● Best practices for designing and implementing decentralized identity systems
● Examples of successful mitigation strategies
Deployments
● Existing open-source software
● Standards bodies, active work, specifications, and participants
Fin
● The importance of addressing vulnerabilities in decentralized identity systems
● The potential impact of successful attacks on individuals and organizations
● The need for continued research and development to improve security and
resilience in decentralized identity systems

Contenu connexe

Tendances

FIDO2 ~ パスワードのいらない世界へ
FIDO2 ~ パスワードのいらない世界へFIDO2 ~ パスワードのいらない世界へ
FIDO2 ~ パスワードのいらない世界へFIDO Alliance
 
Infographic: AWS vs Azure vs GCP: What's the best cloud platform for enterprise?
Infographic: AWS vs Azure vs GCP: What's the best cloud platform for enterprise?Infographic: AWS vs Azure vs GCP: What's the best cloud platform for enterprise?
Infographic: AWS vs Azure vs GCP: What's the best cloud platform for enterprise?Veritis Group, Inc
 
Oracle Cloud Infrastructure:2022年12月度サービス・アップデート
Oracle Cloud Infrastructure:2022年12月度サービス・アップデートOracle Cloud Infrastructure:2022年12月度サービス・アップデート
Oracle Cloud Infrastructure:2022年12月度サービス・アップデートオラクルエンジニア通信
 
IDA,VC,DID関連仕様 最新情報 - OpenID BizDay #15
IDA,VC,DID関連仕様 最新情報 - OpenID BizDay #15IDA,VC,DID関連仕様 最新情報 - OpenID BizDay #15
IDA,VC,DID関連仕様 最新情報 - OpenID BizDay #15OpenID Foundation Japan
 
NIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO AuthenticationNIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO AuthenticationFIDO Alliance
 
What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?Evernym
 
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -Naoto Miyachi
 
OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36Torsten Lodderstedt
 
OpenID Connect Client Initiated Backchannel Authentication Flow (CIBA)のご紹介 ~ ...
OpenID Connect Client Initiated Backchannel Authentication Flow (CIBA)のご紹介 ~ ...OpenID Connect Client Initiated Backchannel Authentication Flow (CIBA)のご紹介 ~ ...
OpenID Connect Client Initiated Backchannel Authentication Flow (CIBA)のご紹介 ~ ...OpenID Foundation Japan
 
金融 API 時代のセキュリティ: OpenID Financial API (FAPI) WG
金融 API 時代のセキュリティ: OpenID Financial API (FAPI) WG金融 API 時代のセキュリティ: OpenID Financial API (FAPI) WG
金融 API 時代のセキュリティ: OpenID Financial API (FAPI) WGNat Sakimura
 
An introduction to blockchain and hyperledger v ru
An introduction to blockchain and hyperledger v ruAn introduction to blockchain and hyperledger v ru
An introduction to blockchain and hyperledger v ruLennartF
 
Oracle Cloud Infrastructure:2022年4月度サービス・アップデート
Oracle Cloud Infrastructure:2022年4月度サービス・アップデートOracle Cloud Infrastructure:2022年4月度サービス・アップデート
Oracle Cloud Infrastructure:2022年4月度サービス・アップデートオラクルエンジニア通信
 
FIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO Alliance
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsThousandEyes
 
Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Merlec Mpyana
 
블록체인 기술과 토큰 이코노미, 비즈니스의 판을 바꾼다
블록체인 기술과 토큰 이코노미, 비즈니스의 판을 바꾼다블록체인 기술과 토큰 이코노미, 비즈니스의 판을 바꾼다
블록체인 기술과 토큰 이코노미, 비즈니스의 판을 바꾼다ICON Foundation
 
Modern Authentication -- FIDO2 Web Authentication (WebAuthn) を学ぶ --
Modern Authentication -- FIDO2 Web Authentication (WebAuthn) を学ぶ --Modern Authentication -- FIDO2 Web Authentication (WebAuthn) を学ぶ --
Modern Authentication -- FIDO2 Web Authentication (WebAuthn) を学ぶ --Jun Kurihara
 
FIDOセキュリティ認定の概要と最新状況
FIDOセキュリティ認定の概要と最新状況FIDOセキュリティ認定の概要と最新状況
FIDOセキュリティ認定の概要と最新状況FIDO Alliance
 
Cisco IT and ThousandEyes
Cisco IT and ThousandEyesCisco IT and ThousandEyes
Cisco IT and ThousandEyesThousandEyes
 
Blockchain Security and Privacy
Blockchain Security and PrivacyBlockchain Security and Privacy
Blockchain Security and PrivacyAnil John
 

Tendances (20)

FIDO2 ~ パスワードのいらない世界へ
FIDO2 ~ パスワードのいらない世界へFIDO2 ~ パスワードのいらない世界へ
FIDO2 ~ パスワードのいらない世界へ
 
Infographic: AWS vs Azure vs GCP: What's the best cloud platform for enterprise?
Infographic: AWS vs Azure vs GCP: What's the best cloud platform for enterprise?Infographic: AWS vs Azure vs GCP: What's the best cloud platform for enterprise?
Infographic: AWS vs Azure vs GCP: What's the best cloud platform for enterprise?
 
Oracle Cloud Infrastructure:2022年12月度サービス・アップデート
Oracle Cloud Infrastructure:2022年12月度サービス・アップデートOracle Cloud Infrastructure:2022年12月度サービス・アップデート
Oracle Cloud Infrastructure:2022年12月度サービス・アップデート
 
IDA,VC,DID関連仕様 最新情報 - OpenID BizDay #15
IDA,VC,DID関連仕様 最新情報 - OpenID BizDay #15IDA,VC,DID関連仕様 最新情報 - OpenID BizDay #15
IDA,VC,DID関連仕様 最新情報 - OpenID BizDay #15
 
NIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO AuthenticationNIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO Authentication
 
What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?
 
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -
 
OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36
 
OpenID Connect Client Initiated Backchannel Authentication Flow (CIBA)のご紹介 ~ ...
OpenID Connect Client Initiated Backchannel Authentication Flow (CIBA)のご紹介 ~ ...OpenID Connect Client Initiated Backchannel Authentication Flow (CIBA)のご紹介 ~ ...
OpenID Connect Client Initiated Backchannel Authentication Flow (CIBA)のご紹介 ~ ...
 
金融 API 時代のセキュリティ: OpenID Financial API (FAPI) WG
金融 API 時代のセキュリティ: OpenID Financial API (FAPI) WG金融 API 時代のセキュリティ: OpenID Financial API (FAPI) WG
金融 API 時代のセキュリティ: OpenID Financial API (FAPI) WG
 
An introduction to blockchain and hyperledger v ru
An introduction to blockchain and hyperledger v ruAn introduction to blockchain and hyperledger v ru
An introduction to blockchain and hyperledger v ru
 
Oracle Cloud Infrastructure:2022年4月度サービス・アップデート
Oracle Cloud Infrastructure:2022年4月度サービス・アップデートOracle Cloud Infrastructure:2022年4月度サービス・アップデート
Oracle Cloud Infrastructure:2022年4月度サービス・アップデート
 
FIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみた
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges
 
블록체인 기술과 토큰 이코노미, 비즈니스의 판을 바꾼다
블록체인 기술과 토큰 이코노미, 비즈니스의 판을 바꾼다블록체인 기술과 토큰 이코노미, 비즈니스의 판을 바꾼다
블록체인 기술과 토큰 이코노미, 비즈니스의 판을 바꾼다
 
Modern Authentication -- FIDO2 Web Authentication (WebAuthn) を学ぶ --
Modern Authentication -- FIDO2 Web Authentication (WebAuthn) を学ぶ --Modern Authentication -- FIDO2 Web Authentication (WebAuthn) を学ぶ --
Modern Authentication -- FIDO2 Web Authentication (WebAuthn) を学ぶ --
 
FIDOセキュリティ認定の概要と最新状況
FIDOセキュリティ認定の概要と最新状況FIDOセキュリティ認定の概要と最新状況
FIDOセキュリティ認定の概要と最新状況
 
Cisco IT and ThousandEyes
Cisco IT and ThousandEyesCisco IT and ThousandEyes
Cisco IT and ThousandEyes
 
Blockchain Security and Privacy
Blockchain Security and PrivacyBlockchain Security and Privacy
Blockchain Security and Privacy
 

Similaire à Attacking Decentralized Identity.pdf

Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idDavid Kelts, CIPT
 
How to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' DataHow to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' DataHellmuth Broda
 
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221David Wood
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
 
Blockchain Perspective - Internet of Memorable Things
Blockchain Perspective - Internet of Memorable ThingsBlockchain Perspective - Internet of Memorable Things
Blockchain Perspective - Internet of Memorable ThingsTim Lackey
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy ExamLisa Olive
 
Blockchain in Identity Management - An Overview.pdf
Blockchain in Identity Management - An Overview.pdfBlockchain in Identity Management - An Overview.pdf
Blockchain in Identity Management - An Overview.pdfJamieDornan2
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYDEEPAK948083
 
Pistoia Alliance Blockchain Webinar 20 June 2017
Pistoia Alliance Blockchain Webinar 20 June 2017Pistoia Alliance Blockchain Webinar 20 June 2017
Pistoia Alliance Blockchain Webinar 20 June 2017Pistoia Alliance
 
INTERVIEW QUESTION FOR IT AUDITOR
INTERVIEW QUESTION FOR IT AUDITORINTERVIEW QUESTION FOR IT AUDITOR
INTERVIEW QUESTION FOR IT AUDITORInfosec Train
 
Blockchain use cases in health and education
Blockchain use cases in health and educationBlockchain use cases in health and education
Blockchain use cases in health and educationNetcetera
 
Distributed data protection and liability on the blockchain
Distributed data protection and liability on the blockchainDistributed data protection and liability on the blockchain
Distributed data protection and liability on the blockchainAlexandra Giannopoulou
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Kaliya "Identity Woman" Young
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerDarrell O'Donnell
 
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinFOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinCalvin Cheng
 
Web 3.0 – From Buzzword to Security with Schellman
Web 3.0 – From Buzzword to Security with SchellmanWeb 3.0 – From Buzzword to Security with Schellman
Web 3.0 – From Buzzword to Security with Schellmansaastr
 
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 PresentationWill My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 PresentationSnag
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?Ulf Mattsson
 
DWeb and Civil Society: An Introduction For Makers
DWeb and Civil Society: An Introduction For MakersDWeb and Civil Society: An Introduction For Makers
DWeb and Civil Society: An Introduction For MakersTechSoup
 

Similaire à Attacking Decentralized Identity.pdf (20)

Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
 
How to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' DataHow to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' Data
 
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
Blockchain Perspective - Internet of Memorable Things
Blockchain Perspective - Internet of Memorable ThingsBlockchain Perspective - Internet of Memorable Things
Blockchain Perspective - Internet of Memorable Things
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
Blockchain in Identity Management - An Overview.pdf
Blockchain in Identity Management - An Overview.pdfBlockchain in Identity Management - An Overview.pdf
Blockchain in Identity Management - An Overview.pdf
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
Pistoia Alliance Blockchain Webinar 20 June 2017
Pistoia Alliance Blockchain Webinar 20 June 2017Pistoia Alliance Blockchain Webinar 20 June 2017
Pistoia Alliance Blockchain Webinar 20 June 2017
 
INTERVIEW QUESTION FOR IT AUDITOR
INTERVIEW QUESTION FOR IT AUDITORINTERVIEW QUESTION FOR IT AUDITOR
INTERVIEW QUESTION FOR IT AUDITOR
 
Blockchain use cases in health and education
Blockchain use cases in health and educationBlockchain use cases in health and education
Blockchain use cases in health and education
 
Trust and inclusion
Trust and inclusionTrust and inclusion
Trust and inclusion
 
Distributed data protection and liability on the blockchain
Distributed data protection and liability on the blockchainDistributed data protection and liability on the blockchain
Distributed data protection and liability on the blockchain
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedger
 
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinFOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
 
Web 3.0 – From Buzzword to Security with Schellman
Web 3.0 – From Buzzword to Security with SchellmanWeb 3.0 – From Buzzword to Security with Schellman
Web 3.0 – From Buzzword to Security with Schellman
 
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 PresentationWill My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?
 
DWeb and Civil Society: An Introduction For Makers
DWeb and Civil Society: An Introduction For MakersDWeb and Civil Society: An Introduction For Makers
DWeb and Civil Society: An Introduction For Makers
 

Dernier

15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon15-Minute City: A Completely New Horizon
15-Minute City: A Completely New HorizonMorshed Ahmed Rahath
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfragupathi90
 
Introduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AIIntroduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AISheetal Jain
 
Geometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfGeometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfJNTUA
 
Lab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docxLab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docxRashidFaridChishti
 
Introduction to Arduino Programming: Features of Arduino
Introduction to Arduino Programming: Features of ArduinoIntroduction to Arduino Programming: Features of Arduino
Introduction to Arduino Programming: Features of ArduinoAbhimanyu Sangale
 
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGBRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGKOUSTAV SARKAR
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxKarpagam Institute of Teechnology
 
Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)NareenAsad
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfEr.Sonali Nasikkar
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisDr.Costas Sachpazis
 
Insurance management system project report.pdf
Insurance management system project report.pdfInsurance management system project report.pdf
Insurance management system project report.pdfKamal Acharya
 
Multivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptxMultivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptxalijaker017
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..MaherOthman7
 
Piping and instrumentation diagram p.pdf
Piping and instrumentation diagram p.pdfPiping and instrumentation diagram p.pdf
Piping and instrumentation diagram p.pdfAshrafRagab14
 
Quiz application system project report..pdf
Quiz application system project report..pdfQuiz application system project report..pdf
Quiz application system project report..pdfKamal Acharya
 
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfMadan Karki
 
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5T.D. Shashikala
 
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message QueuesLinux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message QueuesRashidFaridChishti
 
Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2T.D. Shashikala
 

Dernier (20)

15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdf
 
Introduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AIIntroduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AI
 
Geometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfGeometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdf
 
Lab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docxLab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docx
 
Introduction to Arduino Programming: Features of Arduino
Introduction to Arduino Programming: Features of ArduinoIntroduction to Arduino Programming: Features of Arduino
Introduction to Arduino Programming: Features of Arduino
 
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGBRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
 
Insurance management system project report.pdf
Insurance management system project report.pdfInsurance management system project report.pdf
Insurance management system project report.pdf
 
Multivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptxMultivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptx
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
 
Piping and instrumentation diagram p.pdf
Piping and instrumentation diagram p.pdfPiping and instrumentation diagram p.pdf
Piping and instrumentation diagram p.pdf
 
Quiz application system project report..pdf
Quiz application system project report..pdfQuiz application system project report..pdf
Quiz application system project report..pdf
 
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
 
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
 
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message QueuesLinux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
 
Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2
 

Attacking Decentralized Identity.pdf

  • 1. Attacking Decentralized Identity Gabe Cohen, TBD / Block Brent Zundel, Gen Crypto & Privacy Village, DEFCON 31 August 11, 2023
  • 3. The Evolution of Digital Identity Identity Model Centralized Federated Decentralized Technology ● ID/Password ● Multi-factor Auth ● SSO ● OAuth ● OpenID ● SAML ● Secure Personal Storage ● SIOP, Web5 ● Cryptographically driven auth Characteristics ● Identity fragmented across many service providers ● Corps have full control of user data ● Centralized data providers at risk for attack ● Rely on a single/set of centralized identity providers ● Identity information fragmented between IdPs ● Centralized data providers at risk for attack ● Identity portable across ecosystems ● User controlled data on-device or user-controlled cloud ● Users are in control of their data
  • 4. 4 SSI Principles ● Existence – Users must have an independent existence ● Control – Users must control their identities ● Access – Users must have access to their own data ● Transparency – Systems and algorithms must be transparent ● Persistence – Identities must be long lived ● Portability – Information and services about identity must be transportable ● Interoperability – Identities should be as widely usable as possible ● Consent – Users must agree to the use of their identity ● Minimalization – Disclosure of claims must be minimized ● Protection – The rights of users must be protected
  • 7. W3C Verifiable Credentials (VCs) A Verifiable Credential is a W3C standard mechanism of expressing claims about an individual on the Web in a way that is cryptographically secure, privacy respecting, and machine-verifiable. A VC is inherently independently verifiable – which means a verifier will never need to go back to the issuer to conduct or complete verification. 7 Claims can include, but aren’t limited to, the same claims in traditional credentials such as health cards, passports, university degrees, or business licenses.
  • 8. Holder The entity controlling a VC. This entity is usually the subject of the VC, though not always. There are scenarios where the entity may have been issued a VC, but is not the subject of the VC. 8 Issuer The issuing entity of a VC. This entity asserts claims about the subject of the VC and issues it to a Holder. Verifier The entity to which a VC is presented to as proof of a claim or set of claims. This entity might request a VC, and then verify that the VC satisfies their requirements. Actors in Decentralized Identity Systems
  • 9. W3C Decentralized Identifiers (DIDs) A Decentralized Identifier W3C standard for a type of user- or business-controlled identifier that enables verifiable, decentralized digital identity on the Web. DIDs are URIs that associate a DID subject with a DID document allowing trustable interactions with that subject. DID documents contain public keys and other data. 9 A DID can refer to any subject, including a person, organization, thing, data model, abstract entity, etc.
  • 12. Decentralized Identity: In the Numbers 60+ Public & private companies building in the space 40+ Countries using some form of Decentralized Identity 12 3B+ Verifiable Credentials Issued
  • 14. 75%+ of the world will be using decentralized identity tech within the next 5 years 14
  • 15. “ “Decentralized identity is important for confirming user identities and securely storing them. It offers numerous advantages separate of the greater identity autonomy it delivers to customers.”1 “…passkeys do not protect our privacy or give us complete control of our online identities. For that to happen, we need to look at self-sovereign identity (SSI).”3 “Individuals can own and manage their own tamper-proof credentials for applications such as personal health, education, and voting records in an encrypted digital wallet on their personal devices.”2
  • 16. Attack Surface 16 Service Providers Networks User Agents Individual Entities Companies like Microsoft, Ping Identity, Okta, MATTR, Trinsic, and more. Their service offering = your opportunity! EBSI, Velocity, Sovrin, Indicio, Cheqd, and others. Networks are forming to standardize, monetize, and facilitate identity Your phone, your computer, your applications. You thought being your own bank was hard, how about being your own IdP? You, your mom, your dog, your employer, your trustworthy local politician. In a world of decentralized trust, each entity is an entrypoint for exploit.
  • 18. 18 Vuln #1: Gimme That Data! ● In a world with verifiable data, any data can be requested by anyone at any time… ○ Why is this data being requested? Is there other less sensitive data that would suffice? ○ Is the requester who they claim to be? How do you know? ○ Is the requester the right entity to receive and handle this data? ○ What can be done with this data in other contexts? What’s protecting the data from unauthorized usage?
  • 19. Attack #1: Abuse of Trust 19 Alice goes to the store… 1. Store requests proof that Alice is over 18 2. Alice scans a QR code with her digital identity app 3. Alice selects which credential matches the request 4. Alice has an option to submit
  • 20. Attack #2: Confused Trust Alice goes to open a bank account… 1. Alice navigates to a bank’s website and clicks “sign up” 2. Alice is asked for a few pieces of information a. Government issued ID b. Proof of employment c. Proof of funds to open the account The website appears legitimate, and her app thinks so too, does Alice send over the data? 20
  • 21. 21 Vuln #2: You thought distributed systems were hard… ● In a distributed systems, usually… ● You’re aware of all nodes in the system ● Consistency ensures that all nodes in the system have the same up-to-date view of data In a decentralized system… ● There is no one method of decentralized consistency ○ Strongly consistent (BTC) ○ Eventually consistent (IPNS) ● Even with consistency, you may not always know if you have the latest state
  • 22. Attack #3: Data (Un)availability Bob goes to verify a credential 22
  • 23. did:jwk (+) Self-resolving key that always has the latest state (-) No updates (-) No way to signal compromise did:web (+) Domain based method (+) Supports updates (-) Relies on TLS certs (-) Relies on DNS / domain registrars (-) No historical state resolution 23 did:ion (+) Supports any DLT and Content-Addressable Storage (+) Permissionless + full featured (update, recovery, deactivation) (-) Complex architecture (-) Uncertain if you have the latest state / pinning risk Attack #4: DIDn’t I tell you?
  • 24. Vuln #3: You want to do WHAT with your data?
  • 25. Attack #5: Heated Seat Subscriptions 25 What You See What They See
  • 26. Attack #6: Oops I centralized again Areas for Centralization ● DIDs ● Data storage / replication ● Verification of credentials ○ Status checks ○ Schema checks ● Wallets/agents ● Permissioned networks ● Payment networks ● SSI Suites (issuance/verification services) ● Everywhere! 26
  • 28. Attack #7: The Semantic Web Strikes Back 28
  • 29. Attack #8: (Don’t) Roll Your Own Crypto 29
  • 30. Attack #9: Is AI going to destroy decentralized trust? 30
  • 31. Attack #10: Why are you hitting yourself? 31
  • 33. Mitigation #1: Smart Agents Digital Bodyguards = Freedom Centralize When Necessary ● Trust needs to start somewhere ● Trusted issuers/verifiers → centralized trust registries ○ What are they trusted for? ○ What have their last x interactions been like? ○ Are there transparent reviews? ● Trusted vendors ○ Agents/wallets ○ Personal data stores Take Privacy-First Stances ● Are you disclosing as little as possible? ● What rights do you enforce after you share? 33
  • 34. Mitigation #2: More than a green checkmark Establish Trust; Minimize Disclosure ● Alice’s smart agent has a built-in Trust Registry, and can now verify that requests are legitimate ● Alice’s smart agent is able to advocate for a privacy-preserving presentation mechanism, selective disclosure ● ZKPs are coming! ● Make sure to authenticate, always Is this enough? 34
  • 35. Mitigation #3: Start From First Principles Decentralize where it matters most ● DID Method → If your DID method isn’t decentralized and feature rich, you’ve boxed yourself in ● DIDs → Use a mix of public/long-lived and private/ephemeral DIDs ● Providers → Make sure your data isn’t locked to a single provider; beware of single vendor solutions Assert your rights ● Is it clear what you’re signing? ● What could go wrong? ● What are you giving up? ● Is there another path? 35
  • 36. More Mitigations ● Build flexible, privacy-promoting standards + software ● User-defined terms of service/use to enforce fair data usage ● Decentralized trust scoring mechanisms (verified Google Reviews/Yelp) ● Use of open source software ● Use of open networks and ecosystems–say no to walled gardens! ● More interactive protocols that enable user negotiation & optionality 36 I m p l e m e n t e r s Individuals O r g a n i z a t i o n s
  • 38. Choose Your Own Adventure 38 User Control Centralization Risk (decreasing) UX (worsening) Nerd Tools Grandma Tools Land of Opportunity
  • 39. Not Your Keys, Not Your Coins → Not Your DID, Not Your Data 39
  • 41. Gabe Cohen : @decentralgabe : gabe@tbd.email https://tbd.website Brent Zundel : @brent_zundel : brent.zundel@gendigital.com https://www.gendigital.com Standards Links ● VCs w3.org/TR/vc-data-model/ ● DIDs w3.org/TR/did-core/ ● DID JWK github.com/quartzjer/did-jwk/ ● DID Web w3c-ccg.github.io/did-method-web/ ● Sidetree identity.foundation/sidetree/spec/ ● Presentation Exchange identity.foundation/presentation-exchange/ ● Trust Establishment identity.foundation/trust-establishment/ ● SD-JWT datatracker.ietf.org/doc/draft-terbu-sd-jw t-vc/02/ ● JWP datatracker.ietf.org/wg/jwp/about/ ● BBS datatracker.ietf.org/doc/draft-irtf-cfrg-b bs-signatures/ Get Involved ● DIF identity.foundation ● W3C VCWG w3.org/groups/wg/vc/ ● W3C DIDWG w3.org/groups/wg/did/ ● DIF Discord discord.gg/ZHxa4FQubB ● TBD Discord discord.gg/tbd ● Gen Twitter twitter.com/GenDigitalInc ● TBD Twitter twitter.com/TBD54566975 Slides: tinyurl.com/defcon31attackingdid
  • 43. ● What is Decentralized Identity anyway? ● That vulnerability is just my type ● Showing some real vulnerability ● Is nothing safe? ● Deployments ● Fin
  • 44. What is Decentralized Identity Anyway? ● SSI Principles ● Verifiable Credentials ● Decentralized Identifiers ● Why would I even want that? ●
  • 45. That vulnerability is just my type ● Private key compromise ● Validity vs verifiability ● Fake News! ● Blockchain problems ● Key management is hard ● Lack of Review
  • 46. Showing some real vulnerability ● Some examples of attacks in the real world ● Ledger data breach ● How attackers might exploit vulnerabilities in decentralized identity systems ● The potential consequences of successful attacks ● Examples of real-world attacks on DIDs and verifiable credentials
  • 47. Is nothing safe? ● Cryptographic techniques and key management practices to strengthen security ● Best practices for designing and implementing decentralized identity systems ● Examples of successful mitigation strategies
  • 48. Deployments ● Existing open-source software ● Standards bodies, active work, specifications, and participants
  • 49. Fin ● The importance of addressing vulnerabilities in decentralized identity systems ● The potential impact of successful attacks on individuals and organizations ● The need for continued research and development to improve security and resilience in decentralized identity systems