You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/02_2_Managing_Claims_Elision.md
+19-14Lines changed: 19 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,7 +47,7 @@ Watch how Amira's anonymity set shrinks:
47
47
48
48
That last combination might describe three people in the world. If an adversary knows those facts and sees BRadvoc8's public profile, correlation becomes trivial.
49
49
50
-
> :warning:**Consider the Correlation Risks Before Making Claims.** Ask "How many people worldwide could truthfully make this exact statement?" If the answer is under 100, combine it with your other public claims and ask again. If the combined answer approaches single digits, that claim needs special handling.
50
+
> ⚠️**Consider the Correlation Risks Before Making Claims.** Ask "How many people worldwide could truthfully make this exact statement?" If the answer is under 100, combine it with your other public claims and ask again. If the combined answer approaches single digits, that claim needs special handling.
51
51
52
52
## The Possibilities of Protecting Sensitive Data
53
53
### Omission, Elision, and Encryption
@@ -178,15 +178,7 @@ envelope format "$AUDIT_ELIDED"
178
178
179
179
The elided version shows nothing, just the word `ELIDED`. But here's the key property: the hash (digest) of the elided envelope will be identical to the hash of the original envelope, offering proof that their content is identical, even though it can not longer be seen in the elided envelope.
180
180
181
-
This commitment could be published in a variety of ways. Amira might
182
-
have a set of self-attestations available on her GitHub, some of which
183
-
are elided and some of which are not. Or, she might maintain a public
184
-
commitment list. This is typically a list of digests in a public
185
-
profile with category hints (e.g., "Security", "Privacy
186
-
Engineering"). This tells collaborators that she has additional
187
-
credentials without revealing what they are.
188
-
189
-
> :book:**What is a Commitment?** A commitment is literally a
181
+
> 📖 **What is a Commitment?** A commitment is literally a
190
182
promise. Cryptographically, a commitment is a promise that you have
191
183
recorded a certain value. All you reveal is a hash of that value,
192
184
which is the cryptographic commitment. Since (probabalistically) each
@@ -198,9 +190,22 @@ by removing individual elements of the XID's
198
190
data. [§4.3](04_3_Creating_Views_and_Versions.md) demonstrates how to
199
191
do so.
200
192
201
-
### Step 4: Store Your Work
193
+
### Step 4: Publish the Commitment
194
+
195
+
In order for a commitment to be powerful, it should be published.
196
+
This commitment could be published in a variety of ways. Amira might
197
+
have a set of self-attestations available on her GitHub, some of which
198
+
are elided and some of which are not. Or, she might maintain a public
199
+
commitment list. This is typically a list of digests in a public
200
+
profile with category hints (e.g., "Security", "Privacy
201
+
Engineering"). This tells collaborators that she has additional
202
+
credentials without revealing what they are. She might even include
203
+
commitments in her XID itself if they're important
204
+
enough. [§4.2](04_2_Publishing_for_Privacy.md) demonstrates some of
205
+
the possibilities.
206
+
202
207
203
-
Again, we're going to store copies of our work for future reference.
208
+
In the meantime, we're going to store copies of our work for future reference.
@@ -237,7 +242,7 @@ the full attestation will come in two parts: checking that this is the
237
242
same document as the commitment (which is very similar to the process
238
243
of checking an inclusion proof) and verifying the signature.
239
244
240
-
> :book:**What is an Inclusion Proof?** An inclusion proof typically
245
+
> 📖**What is an Inclusion Proof?** An inclusion proof typically
241
246
reveals that a piece of data is part of a larger data set without
242
247
revealing the entirety of the larger data set. For example, you could
243
248
a claim was in a partially elided Gordian Envelope just by knowing a
@@ -276,7 +281,7 @@ fi
276
281
277
282
The digests match. This proves the full attestation Amira revealed is the same document she committed to earlier, not something she fabricated after the fact.
278
283
279
-
> :book:**Why Is It Important that Amira Committed in Advance?** Amira committing and publishing her elided commitment about her security audit work literally shows commitment. Progressive trust is all about establishing and improving levels of trust, and this is a strong signal that Amira can be trusted on this claim (which is otherwise not verifiable). She made the statement some time ago. It's been publicly available on the web for some time, something that might be verifiable by GitHub timestamps or archive.org storage. It's also presumably a part of a relatively small set of claims (or at least a relatively small set of hidden claims). That means that Amira isn't just pulling the claim that she can do security audits out of a hat. It's one of a small number of things she said some time ago, increasing its credibility despite the lack of verification.
284
+
> 📖**Why Is It Important that Amira Committed in Advance?** Amira committing and publishing her elided commitment about her security audit work literally shows commitment. Progressive trust is all about establishing and improving levels of trust, and this is a strong signal that Amira can be trusted on this claim (which is otherwise not verifiable). She made the statement some time ago. It's been publicly available on the web for some time, something that might be verifiable by GitHub timestamps or archive.org storage. It's also presumably a part of a relatively small set of claims (or at least a relatively small set of hidden claims). That means that Amira isn't just pulling the claim that she can do security audits out of a hat. It's one of a small number of things she said some time ago, increasing its credibility despite the lack of verification.
0 commit comments