From b2242ca135f7c9fb475127008e27e61781058229 Mon Sep 17 00:00:00 2001
From: Thomas Walker Lynch
-A strange property of our universe is that it is often more difficult to find a solution to a problem, than it is to recognize that a proposed solution works. It is a pattern matching problem that takes some concentration when holding a peg to figure out which hole it should go into, and sometimes the person with the peg gets it wrong, and tries again. In contrast the peg either goes into the hole or it doesn't, some wiggling and rotation might be involved, but it is not a mental puzzle to be solved. A well known property of mathematical proofs is that it is more difficult to find a new one, than it is to walk through and check each step. The former is a creative process, while the latter is a mechanical exercise. This is why it is often possible to define a A voting procedure is not a If a fingerprint is a password, then a person leaves their "password" on every water glass, door handle, and table they touch. How was that supposed to work?
I hope readers will think about this, especially the non-technical among you. There is expensive important lesson here. There is a place for commonsense in security discussions. Investors and legislators alike should not fear asking commonsense questions, and getting answers back that they can understand.
- This failure provides an expensive lesson: commonsense belongs in security discussions. Legislators and investors must ask foundational questions and demand intelligible answers.
+ Ok, so fingerprints are not a great idea, so we should move to faces?
- Technicians know how to build to spec, the good ones are good at it. Of course everyone reads the tech sections of news, and see a lot of exciting things coming. However, that does not make them into big-picture visionaries. Lawmakers must trust their common-sense judgment, and expect entrenched technology interests to propose further entrenchment. The goal is structural architectural integrity for the economy, rather than adding more layers that make life difficult for a person. + Technicians know how to build to spec, the good ones are good at it. Of course everyone reads the tech sections of news, and see a lot of exciting things coming. However, that does not make them into big-picture visionaries. Lawmakers must trust their common-sense judgment, and expect entrenched technology interests to propose further entrenchment.
@@ -544,7 +544,7 @@ Engineers later discovered the cause. Temporary abuse-mitigation rules that had- The technology industry claims that sensors will improve to fix these error rates, sometimes proposing invasive alternatives like retina scans to guarantee identity. However, this ignores the fatal structural flaw of remote authentication. Over the Internet, a server does not authenticate a physical face or a physical eye; it authenticates a digital signal sent from a remote device. + The technology industry claims that sensors will improve to fix these error rates, sometimes proposing invasive alternatives like retina scans to guarantee identity. However, this ignores the fatal flaw of remote authentication. Over the Internet, a server does not authenticate a physical face or a physical eye; it authenticates a digital signal sent from a remote device.
@@ -555,31 +555,31 @@ Engineers later discovered the cause. Temporary abuse-mitigation rules that had
We must distinguish between two types of identification that serve entirely different purposes. The first type functions to locate information about a person on a ledger such as a database. It is like a player's number in sports. The second type of ID serves to confirm that the person has given a correct ID of the first type.
- We will call this first type of ID the
We will call the second type of ID the
We see these two types of ID when logging into a computer. First a user gives a
+ We see these two types of ID when logging into a computer. First, a user gives a
- Many organizations don't seem to be clear on these two distinct uses of ID. It is common for an organization to expect things from a unique number ID that it lacks the capacity to do, such as serving as proof of identity. Using unique number ID as a proof ID is typically vulnerable due to two reasons, a regular and dense ID space, and poor privacy of the numbers. When unique number IDs are issued in series, then an attacker can follow the pattern. If the space of unique number IDs is dense, then any guess will be an actual ID. Unique number IDs are typically used at face value, thus when typed or used over the phone, that text or spoken number is literally the ID. These attributes are fine when a unique number ID is used as a locators, but lead to high probability of catastrophic failure when used as identity proof.
-
+ Many organizations do not seem to be clear on these two distinct uses of ID. It is common for an organization to expect things from a unique number ID that it lacks the capacity to do, such as serving as proof of identity. Using a unique number ID as a proof ID is typically vulnerable due to two reasons: a regular and dense ID space, and poor privacy of the numbers. When unique number IDs are issued in series, an attacker can follow the pattern. If the space of unique number IDs is dense, then any guess will be an actual ID. Unique number IDs are typically used at face value, thus when typed or used over the phone, that text or spoken number is literally the ID. These attributes are fine when a unique number ID is used as a locator, but lead to a high probability of catastrophic failure when used as identity proof.
+
- A good example of a unique number ID that is often misused as a proof ID is the social security number. The are issued in series, the space is dense, and the number is the ID. Furthermore they appear in clear text in many honeypot databases. Over time, government and private entities began requesting the SSN as a proof ID to verify identity. Congress has passed some legislation to protect Social Security numbers from being made public, which could be construed to protect their use as proof ID; however this is security theater, for the reasons outlined above, and because that water already left the dam. Most notably, Section 7 of the Privacy Act of 1974 explicitly makes it unlawful for federal, state, and local government agencies to deny a person any right, benefit, or privilege because of a refusal to disclose their Social Security Number. Apparently it is to be kept secret to preserve its value as a proof ID?
-
+ A good example of a unique number ID that is often misused as a proof ID is the Social Security Number. They are issued in series, the space is dense, and the number is the ID. Furthermore, they appear in clear text in many honeypot databases. Over time, government and private entities began requesting the SSN as a proof ID to verify identity. Congress has passed some legislation to protect Social Security numbers from being made public, which could be construed to protect their use as a proof ID; however, this is security theater, for the reasons outlined above, and because that water already left the dam. Most notably, Section 7 of the Privacy Act of 1974 explicitly makes it unlawful for federal, state, and local government agencies to deny a person any right, benefit, or privilege because of a refusal to disclose their Social Security Number. Apparently, it is to be kept secret to preserve its value as a proof ID?
+ Policing money
@@ -719,21 +719,25 @@ Engineers later discovered the cause. Temporary abuse-mitigation rules that had
The United States is one of only two nations that utilizes Citizenship-Based Taxation (CBT) instead of Residency-Based Taxation (RBT). Because the IRS must track every dollar a citizen touches globally, the U.S. is the lead architect of the global financial "Phone Home" system. This requires every bank on the planet to report on American dealings (FATCA).
- This structural requirement is the hidden driver for an interoperable, global digital ID. Every dollar holder is now a suspected of being a money launderer, a drug dealer, or a tax-evading "sneak." In a CBT world, the source and identity of the money are more important to the state than the payment itself. We secure the portal to pay taxes, not because the account holder wants to prevent others from paying his or her taxes, but rather because the government needs to know where the money came from. + This global tracking mandate is the hidden driver for an interoperable, global digital ID. Every dollar holder is now suspected of being a money launderer, a drug dealer, or a tax-evading "sneak." In a CBT world, the source and identity of the money are more important to the state than the payment itself. We secure the portal to pay taxes, not because the account holder wants to prevent others from paying his or her taxes, but rather because the government needs to know where the money came from.
-For a nation to tax an citizens' and residents' income, they must be able to verify what that income is. Initially this was done by having companies and contracting entities to report salaries and contract amounts to the IRS, a copy of that report is sent to the individual, and the individual must also send his copy to the IRS, so that the IRS can also verify the sent the report. +
+ For a nation to tax the income of its citizens and residents, it must be able to verify what that income is. Initially, this was done by requiring companies and contracting entities to report salaries and contract amounts to the IRS. A copy of that report is sent to the individual, and the individual must also send their copy to the IRS, allowing the agency to cross-verify the reports.
-Now that the government polices money, they are able to see financial transactions at banks. In theory this could replace the old system, but instead both are done. Any discrepancies are then used as signals for triggering audits. +
+ Now that the government polices money, it is able to monitor financial transactions at banks. In theory, this could replace the old system, but instead, both are done. Any discrepancies are then used as signals for triggering audits.
-Each person is then given a tax account. This tax account is accessible online. The digital ID then ties all of this together. Note that the each individual has a social security number, and those numbers are used to key database records, but they lack the security and privacy required to be used as an ID. +
+ Each person is then given a tax account. This tax account is accessible online. The digital ID then ties all of this together. Note that each individual has a Social Security Number, and those numbers are used to key database records, but they lack the security and privacy required to be used as a secure ID.
-The next step for this system appears to be that of central bank digital currencies, where every transaction is an SQL command on a database. The government would then, in theory, have awareness of all transactions, and the capability to force their own transactions. +
+ The architectural trajectory of this system appears to be heading to central bank digital currencies (CBDCs), where every transaction functions as a direct query on a state database. In such a paradigm, the government gains absolute visibility into all transactions and the capability to unilaterally execute or block transfers.
- Not all legislation seeks to deepen the
This is not a standalone chapter. The things stated here are carefully built upon the material that comes before it. This is a white paper on security and this chapter discusses how to reduce the risk equations given in How experts think about risk. Any resemblance to someone's political platform is a coincidence, unless that platform used the reasoning of better cybersecurity. - -
+ The recommendations in this chapter derive strictly from the mathematical implications of the catastrophic risk equations detailed in How experts think about safety. To reduce the probability of catastrophic failure, an architecture must eliminate the dependencies that demand complex security in the first place. +
-The most powerful thing we can do to make computer ID more practical is to diminish the need for it in the first place. The chapter Why we want digital ID lists the reasons for ID, so lets discuss those. +
+ The most powerful thing we can do to make computer ID more practical is to diminish the need for it in the first place. The chapter Why we want digital ID lists the reasons for ID, so let us discuss those. +
- In 1937, Nikolai Yezhov, the head of the Soviet secret police issued NKVD Order No. 00447. This directive established explicit quotas for the execution or imprisonment of citizens in every geographic district of the Soviet Union. To fulfill these arbitrary numerical targets, local authorities utilized centralized municipal records, census lists, and employment files to efficiently locate and process victims. Obviously, this sort of thing would destroy the garden of golden flowers and group intelligence effects. + In 1937, Nikolai Yezhov, the head of the Soviet secret police, issued NKVD Order No. 00447. This directive established explicit quotas for the execution or imprisonment of citizens in every geographic district of the Soviet Union. To fulfill these arbitrary numerical targets, local authorities utilized centralized municipal records, census lists, and employment files to efficiently locate and process victims. This is an extreme example of how data found databases could repurposed to assert control and to destroy the garden of golden flowers.
- From a security point of view, databases are honeypots for those who desire power over people, be they despots or cybersecurity attackers looking for money. The simplest way to thwart this effect is to not have the honeypot in the first place. Hence, the security expert's first question, which databases are not required? The second question, among those that are required, can they be made to have more focused purpose? Can the number of records and fields be reduced? Are citizens really so interesting? + From a security point of view, databases are honeypots for those who desire power over people, be they despots or cybersecurity attackers looking for money. The simplest way to thwart this effect is to not have the honeypot in the first place. Hence, the security expert's first question: which databases are not required? The second question, among those that are required: can they be made to have a more focused purpose? Can the number of records and fields be reduced? Are citizens really so interesting?
The obvious thing that offers itself here is to disentangle the two meanings of ID for the Social Security number, and to then make it available as a
+ The obvious thing that offers itself here is to disentangle the two meanings of ID for the Social Security Number, and to then make it available as a
Though a drawback of a Social Security Number as a
+ Though a drawback of a Social Security Number as a
Alternatively, there could be a new issuing of
+ Alternatively, there could be a new issuing of
As explained in the Catastrophic failureThat security becomes disproportionally more manageable when the problem is made smaller. For income tax there is an obvious way to do this. Money flows in a circle. We tax it both when it is a salary or contract payment when it enters people's pockets, and when it enters a company as revenue. It is the same money going all the way around. +
+ As demonstrated in the Catastrophic failure section, security becomes disproportionately more manageable when the problem domain is made smaller. For income tax, there is an obvious simplification. Money flows in a circular economy. Currently, the state taxes it both when it enters an individual's pocket as a salary or contract payment, and when it enters a company as revenue. It is the same money going all the way around.
-
+
- There are approximately 161 million tax payers, but only 6.7 million companies. The security and enforcement problems would be a magnitude less complex, if we collected tax at the point in the circle where it entered companies.
++ There are approximately 161 million taxpayers, but only 6.7 million companies. The security and enforcement problems would be a magnitude less complex if we collected tax at the point in the circle where it entered companies. +
-The reduced complexity manifests dramatically on the enforcement side. Whoever thought it was a good idea to pull grandmothers and the lesser able among us into complex accounting problems, audits, and penalties? On the other hand, the very reason corporations were formed was to formalize their financials and liability. They already engage professional accountants. They already have fiduciary duties.
++ The reduced complexity manifests dramatically on the enforcement side. Whoever thought it was a good idea to pull grandmothers and the lesser able among us into complex accounting problems, audits, and penalties? On the other hand, the very reason corporations were formed was to formalize their financials and liability. They already engage professional accountants. They already have fiduciary duties. +
Only two countries in the world use citizenship based taxation, the United States and Eritrea. I understand it was introduced in the Civil War out of fear that Americans would move to Canada to avoid paying for the war. However, it has caused problems in that when Americans move to other countries, they use services in those other countries, so those other countries tax all residents, including Americans. This leads to a double taxation problem for Americans. So as to alleviate the double taxation problem the U.S. has entered into treaties so that Americans need not pay U.S. tax when paying tax in a foreign country. +
+ Only two countries in the world use citizenship-based taxation: the United States and Eritrea. I understand it was introduced in the Civil War out of fear that Americans would move to Canada to avoid paying for the war. However, it has caused problems in that when Americans move to other countries, they use services in those other countries, so those other countries tax all residents, including Americans. This leads to a double taxation problem for Americans. So as to alleviate the double taxation problem, the U.S. has entered into treaties so that Americans need not pay U.S. tax when paying tax in a foreign country.
-Said tax treaties create a defacto residence based tax. From the point of view of reducing complexity so that computer security is tractiable, the commonsense solution here would be to move to a residence based tax and eliminate the paperwork burden.
++ Said tax treaties create a de facto residence-based tax. From the point of view of reducing complexity so that computer security is tractable, the commonsense solution here would be to move to a residence-based tax and eliminate the paperwork burden entirely. +
The primary point of policing money can be moved to the same point as for taxation. In addition international movements would have to be corporate and commercial accounts. They pretty much already are, as everything goes through banks. However, the burden on banks would be greatly reduced, as only commercial accounts would require transaction reporting. This would again reduce the data to be sifted through by a magnitude. +
+ The primary point of policing money can be moved to the same point as for taxation. In addition, international movements would have to be corporate and commercial accounts. They pretty much already are, as everything goes through banks. However, the burden on banks would be greatly reduced, as only commercial accounts would require transaction reporting. This would again reduce the data to be sifted through by a magnitude.
The above does not address issue from the sections International scammers, and Public no longer means public. Reasoning Technology, and others have proposals for this. The NIST mDLs for example. If you are interested in hearing more about the Reasoning Technology intellectual property, please contact me. -
+
+ The proposals above address systemic vulnerabilities by eliminating the need for vast identity infrastructure. However, this does not address the issues raised in the sections regarding international scammers and the loss of public access. For these specific challenges, a secure
+ Reasoning Technology has developed a foundational identity architecture, RTID, that shatters the false choice between massive surveillance honeypots and zero utility. It functions securely in the presence of quantum technology and strong AI, requires no mandated hardware capital expense from the citizen, and exerts minimal productivity impact. I would welcome the opportunity to provide a technical briefing on how architectures like RTID can secure our digital infrastructure without sacrificing the garden of golden flowers. +
++ The CHIPS and Science Act of 2022 directed the National Institute of Standards and Technology (NIST) to launch new work to develop a framework of common definitions and voluntary guidance for digital identity management systems. This includes identity and attribute validation services provided by federal, state, and local governments. +
++ While work is underway at NIST to create this guidance, state and local agencies lack the resources to implement it. Proponents of federal intervention argue that if this does not change, it will take decades to harden deficiencies in the identity infrastructure. The legislative mandates and grant programs driving this infrastructure expansion typically cite the following objectives: +
+
+There is a paradox at the heart of contemporary cybersecurity legislation. The goals of protecting privacy and reducing vulnerability are sound. However, the prescribed technological solutions, specifically interoperable digital driver's licenses and centralized defenses against deepfakes, inevitably mandate the creation of the exact aggregation honeypots and