Most active commenters
  • lifeisstillgood(6)
  • mike_hearn(5)
  • Avamander(4)
  • hellojesus(4)
  • freedomben(3)

←back to thread

596 points pimterry | 40 comments | | HN request time: 1.365s | source | bottom
1. lifeisstillgood ◴[] No.36862777[source]
I kind of get both sides here. If we take the "see the best of others intentions" then a web that is populated by identified humans (and their authorised proxies!) is likely to be the "cleanest", most ideal web space we can see (a web full of sock puppets and link farms is not ideal).

The clearest end point for this is some government issued digital ID that just asserts who you are, acts as a login etc.

You can see this as a stepping stone to there. if you squint.

Is it the idealism of the 70s coke to life? No. Is it some sane compromise - I think so.

What if we cannot trust our government ? Sorry it is pretty sure that no internet is going to solve that. That's on the real world.

replies(10): >>36862946 #>>36863031 #>>36863074 #>>36863126 #>>36863250 #>>36863286 #>>36863456 #>>36863735 #>>36864436 #>>36871915 #
2. Avamander ◴[] No.36862946[source]
> The clearest end point for this is some government issued digital ID that just asserts who you are, acts as a login etc.

Already exists in a bunch of countries. Works better in some than in others.

The issue is that you don't want everything tied to that ID. In a less than ideal world, ideally the ID would just attest that some random pseudo-ID is real. Like Webauthn, kinda.

replies(1): >>36868208 #
3. dangus ◴[] No.36863031[source]
Whether this is bad or good really depends on the details and the overall strictness. It seems like none of the articles I've seen on the subject go into depth explaining what makes a device "legitimate."

This could be a really good thing if all it's doing is proving that your device isn't malicious, or being better able to detect whether you are a bot. If our end-user experience doesn't change but we stop filling out CAPTCHAs and seeing Cloudflare bot checker load screens, that would be a big plus.

This could be a really bad thing if it means that the web now will just widely reject alternative browsers or computers that have elevated administrative permissions.

I think if we want to see how this plays out, we can look at the Google Play store. A common example that already exists is that banking apps will block rooted Android devices, and it sounds like this attestation API will have the ability to do something similar.

In my opinion, that situation seems perfectly reasonable, and it also seems like most websites don't have the same incentive to block modified devices as higher security services like banks.

replies(2): >>36863151 #>>36863320 #
4. tolmasky ◴[] No.36863074[source]
> a web that is populated by identified humans (and their authorised proxies!) is likely to be the "cleanest", most ideal web space we can see (a web full of sock puppets and link farms is not ideal).

Depends on your definition of "ideal", and whether you even want to strive for such an "ideal". To me this sounds more like a "sterile" web. If we temporarily assume that humans won't do what they're experts at (finding ways around that system too), and take at face value that this will lead to this "cleanest" web space, we are still assuming that that's what consumers want. I would argue that the very existence, and success, of the web in the face of approximations to this "ideal" space in the native-app-world disproves this theory. We have the App Store, we have lock-down control and identifiability for apps, and yet the web still manages dominate commerce in the face of this. Consumers still end up going to the web, and arguably increasingly so with things like Figma. So where are the cries for this "sanitized" web? The demand certainly doesn't appear to be on the consumer end, that's for sure.

replies(1): >>36864293 #
5. tehwebguy ◴[] No.36863126[source]
> If we take the "see the best of others intentions"

You do not, under any circumstances, have to “see the best of [a corporation’s] intentions”

6. kiratp ◴[] No.36863151[source]
Explanation in relatively straightforward form: https://developer.apple.com/wwdc22/10077

Don’t shoot the messenger!

7. codedokode ◴[] No.36863250[source]
> web that is populated by identified humans

This is not going to work. The governments will create millions of fake identities to spread their propaganda, same way as they are making fake passports for spies.

replies(2): >>36863406 #>>36863852 #
8. jchw ◴[] No.36863286[source]
Nobody ever asks why this has all become "necessary" even though it is literally the poignant question. Why do we need such ridiculously strong attestation of identity? How did the Internet get along so far without it, if it's really needed?

Well, nobody is actually proposing this at the moment. Heck, neither Apple nor Google's scheme even gets close. All their schemes purport to do is ensure the "integrity" of the platform.

Integrity how, exactly?

> For example, this API will show that a user is operating a web client on a secure Android device.

So basically, it does not tell you that the user is a unique person, or give you any kind of usable identifier for a person. All it tells you, in case of this example and Apple's, is that the device is not rooted or jailbroken.

In practice, is this concept useful? Only as part of a larger cat and mouse game. Just like copyright protection schemes, remote attestation schemes are limited by what they're actually attesting. Very little can be done to stop cam rips in movie theaters, or any number of in-between steps that exploit the fact that a movie is just a series of pictures and frames of PCM samples at the end of the day. And likewise, devices may be expensive, but there's nothing stopping someone from acquiring many of them to do operations on. In fact, many people already own swaths of Android devices specifically for cheating the system. When they can be had for as cheap as $50 a pop in some cases, it's not really a meaningful barrier.

So what does this actually do? It just makes it more expensive and complex to run bot operations, and if you can raise the cost enough to sink the break-even point of doing so, then theoretically you've won! ... But it won't, because there's a lot to be gained by spamming and scamming people. All of these years of countermeasures and we're not even close to getting there. The amount of money that flows in the industry of cheating these systems is more than enough to just pay the cost.

Adding government IDs to the mix won't change anything. Almost every SPAM operation has a real person behind it, so getting a blind attestation that a person is indeed a citizen tells you almost nothing about them. I think just about the only way that could aid in any way is if it were set up in such a way that you did in fact receive a unique ID for each person, rather than just an attestation that you're dealing with a legitimate thing.

And if that's the end game of the Internet, then honestly, the whole experiment was not worth it.

replies(1): >>36864709 #
9. mike_hearn ◴[] No.36863320[source]
Legit for banks tends to just mean that basic security rules are being enforced, like app separation and credential protection. Technically, what banks and other fraud-sensitive services care about is not whether your device allows you to do things or not, but whether it allows malware to do things. If malware can get root then it can steal credentials that would let it impersonate the user and initiate cash transfers.

That's why Android devices allow you to obtain root and unlock the bootloader but factory reset the device whilst doing it. Banks don't care about that feature because it's not accessible to malware and even if someone does it (e.g. because they physically swipe your phone for a few minutes) the login cookies are wiped in the process.

The problem with rooting or jailbreaking outside of this process is that it could have been done by malware instead of the user - you can't tell post-hoc - and even if it was done by the user, rooted phones often have semi-broken security systems e.g. they turn sudo on or users run random apps as root that were grabbed off anonymous GitHub accounts. From the bank's perspective all this is highly risky both for you and more importantly for them, as ultimately weak security = fraud = reputational and financial risk to the bank.

Still, realistically, what banks care about is devices that were silently rooted by malware (or physical thieves). Individual Linux hackers are such a tiny number of people they'd probably be OK with just letting those people get rinsed if they run malware. The problem is, how do you know which is which?

A meet-in-the-middle compromise for the banking use case is for some neutral standards body to certify OS builds against a set of concretely specified security goals, whether they're open source or not. There's no specific technical problem, it's a social issue that it's expensive to do such audits and open source hackers don't want to pay for things. LetsEncrypt solved the same problem with SSL by just brute forcing the issue with money, which may be the way Google/Apple choose to go here. If you want root on your device to customize your window manager or something then no, don't give yourself root, instead spin a deterministic OS build with whatever changes you would have made using root, ensure the OS build is secure and then submit it for auditing. Done properly the audit can be mostly automatic, e.g. if the SELinux rules match the set found in a base distro that's already trusted, then you can know that credential protection/debug APIs are configured as before, so then you can wave through changes to non-critical OS processes.

replies(2): >>36863933 #>>36864153 #
10. mike_hearn ◴[] No.36863406[source]
But websites don't care about government-issued IDs. They have their own IDs, and to create those you have to fill out a form. If the form is successfully rate limited then the cost and speed at which fake IDs can be created gets prohibitive even for governments, unless you think they only need a small number of accounts.
replies(1): >>36863865 #
11. ◴[] No.36863456[source]
12. jauntywundrkind ◴[] No.36863735[source]
There is absolutely nothing to prevent troll farms from buying dozens of cheap trusted PC systems & using screen share to automate the heck out of these devices. Or plugging in fake mice/keyboards that directly feed input.

Secure hardware feels like it has no upside. It will not even be a speed bump for anyone spreading disinformation at any level of scale. It mildly inconveniences only extremrly unsophisticated/casual bad actors. And it greatly constrains who can make a browser and those with non-Trusted devices, such as Linux users or people who turn off Trusted Boot.

13. phatfish ◴[] No.36863852[source]
Yeah good point, lets just give up and let Apple, Google and Microsoft spread their propaganda instead. Which is just going to be US propaganda for everyone with zero chance for me to change how US controlled corporations behave.

At least I have some say who is screwing me when my government is democratically elected (to whichever degree of democracy you have).

replies(1): >>36865681 #
14. freedomben ◴[] No.36863865{3}[source]
You don't think the governments will force Apple, Google, etc to attest their things? I mean, they made them provide access to their firehose of data so they could mine it for metadata...
replies(1): >>36864060 #
15. Aerroon ◴[] No.36863933{3}[source]
What banks really care about is ticking a liability box. If it screws over a bunch of users then they won't care, because every other bank will be doing the same.

Or in other words: phone banking in western countries is a joke, because the people that might've popularized it were shut out of the system before it gained popularity.

16. mike_hearn ◴[] No.36864060{4}[source]
We're talking about the same Apple that's currently threatening to yank some of its most popular products from the UK rather than disable e2e encryption? The same Google that reacted to the Snowden memos by putting the entire engineering division in an encryption Code Red, such that inter-dc links were almost fully encrypted just a few weeks later?

And that's for morally ambiguous cases where the justification is popular and well established things like crime fighting, child porn and so on.

We don't know what will happen in future, but given the story so far, the chances of these companies saying to governments, sure, have 500,000 free accounts so you can spam our users with incompetent political propaganda, is virtually zero.

replies(1): >>36864489 #
17. lifeisstillgood ◴[] No.36864153{3}[source]
Now that's an interesting idea. It keeps options open which is vital. I suspect it will be easier just to have a second "normie" device but I love the idea.
18. lifeisstillgood ◴[] No.36864293[source]
"clean" / "sanitized" is not the terms I really want. I think a web (living under a democratic legal system) that uses sane forms of digital identity verification will help reduce the ridiculous levels of online fraud we are seeing. (yes citation needed)

To me that's (again under legal / democratic protections) using some centralised public private key (probably) and a curated env and this is (sort of being very generous) a first step towards that world.

replies(2): >>36865773 #>>36869130 #
19. wzdd ◴[] No.36864436[source]
> then a web that is populated by identified humans (and their authorised proxies!)

You wrote "I kind of get both sides here", but, to be clear, this is the polar opposite of both the WEI proposal and Apple's thing, both of which go to some lengths to not allow identification of actual humans (they focus on proving that the device is legit).

replies(1): >>36864697 #
20. freedomben ◴[] No.36864489{5}[source]
Yes, we're talking about the same Google that only reacted that way to PRISM when a leaker blew the whistle (do we need to wait/hope for a whistle blower for every government thing they comply with?). The same Apple that moved the data for all Chinese customers to data centers where the CCP can access/monitor them. The same Apple that censors/filters the app store for Chinese users to enforce government policies.

The chances that they would comply with future government requirements cannot possibly be "virtually zero."

replies(1): >>36864921 #
21. lifeisstillgood ◴[] No.36864697[source]
Because the proving the human is legit is also the next obvious step, it's where many governments (democratic and not!) are heading. I mean it's not a huge leap to go from "this device number 1234 is legit to "paul bought device 1234" or "paul used device 1224 to access bank account 5678".

The next step is barely a step.

replies(1): >>36868634 #
22. treis ◴[] No.36864709[source]
>How did the Internet get along so far without it, if it's really needed?

By each individual site expending a great deal of effort to identify their users. Or by offloading it to someone else expending a great deal of effort like putting their site behind Cloudflare or restricting e-mails to legit providers.

replies(1): >>36865644 #
23. mike_hearn ◴[] No.36864921{6}[source]
China is kinda irrelevant here because western social networks and services are blocked there anyway, so the Chinese government can indeed compel Chinese companies to spam users with political propaganda (and does), but western companies are irrelevant in that process.

For Google and PRISM, I'm sure it won't change your mind, but I worked there at the time and the reaction was genuine. If there were people inside the firm who knew about it at all it must have been a very small group of spies/double agents, and such people were never detected despite a thorough search. Given that it was all based on fiber taps done by telcos though, it's not clear why they'd need any insiders. The assumption of formal cooperation was based on the phrasing of one or two sentences in some leaked documents, but the way the whole thing was set up didn't actually require it so, what those insiders would have been doing was a bit unclear.

Anyway, this is all by the by. We can't know what will happen in future. But if they won't budge on E2E encryption then it seems unlikely they'd be willing to bypass anti-spam measures, which is far more detectable, far less justifiable, and probably doesn't fit within any existing laws.

replies(1): >>36865059 #
24. freedomben ◴[] No.36865059{7}[source]
Thanks, that actually does make me feel a bit better about Prism.

Do you have any experience with how things have changed over the last few years at Google?

I have a friend who said that 2016 was really a turning point in the culture. Prior to that most people were all about liberal values like free speech, and user freedom, but in the last 6 or 7 years it's become very "moderation" or "censorship" friendly (depending on your views), including for things like OP topic. On the plus side he has said that privacy is don't that used to be an after thought of anything, but is now in the cultural zeitgeist, do it's not all bad. Do you have any experience you're willing to share on that?

replies(1): >>36865491 #
25. mike_hearn ◴[] No.36865491{8}[source]
I left in 2014 so don't know what happened after that. It does seem that 2016 was a turning point for a lot of institutions. The Google that believed in empowering people through "making the world's information universally accessible and useful" was definitely dead by that point, although they still claim that's the mission.

I don't agree that privacy was an afterthought before then. There were a lot of internal controls and privacy considerations had been a part of the design process even when I first joined in 2006. Of course the level of effort ramped up over time as the company grew. The primary constraint then as now was simply that most users trust tech firms, don't include them in their threat model and will reject even tiny amounts of inconvenience in the name of privacy. So that really heavily constrains what can be done. For example it kills most attempts at proper end-to-end encryption, leaving us with this sort of strange pseudo-e2e-encryption that's more a legal hack than anything serious (the company that supplies you with the encryption equipment is your adversary, which makes no sense in any classical conception of cryptography).

26. pessimizer ◴[] No.36865644{3}[source]
> By each individual site expending a great deal of effort to identify their users.

Very few sites are putting in any significant effort to identify their users. Those largely predatory sites shouldn't be setting policy for the entire web.

replies(1): >>36865788 #
27. pessimizer ◴[] No.36865681{3}[source]
> let Apple, Google and Microsoft spread their propaganda instead.

Who said you had to choose between these two scenarios again? It's so bizarre that people see government as an oppositional force to government contractors operating under government charters.

28. tolmasky ◴[] No.36865773{3}[source]
I guess I just don't see this "insane level of fraud"(?) By this I mean that it doesn't really affect my experience on the web, even if I were to entertain the idea that it does, in fact, exist. When I think about my annoyances with the web, they aren't about how I am drowning in link farms or whatever -- ironically my true consumer annoyances are quite the opposite: all the big players have stopped providing me value. Google shows me entire pages of ads before any relevant organic search results. Reddit killed my preferred third party client. Meanwhile Twitter, well, you know. Nothing proposed here does anything for that, and I get that it's not trying to solve that, but my point is that none of my "top 10 problems with the web" are being solved by this humongous change. My problems just have nothing to do with sock puppet accounts or whatever. Perhaps that's a top 10 problem that advertisers have with the web, but that's not really super compelling to me (the same way my problems don't seem to be compelling to them). If anything, as stated in various places, these hyper centralized ID systems increase the likelihood that my problems will never be solved. If it becomes even harder than it already is to make a new browser or a new search engine, then I guess I'm just flat out of luck. The era of "reasonable search results" will be solidified as a temporary blip on the timeline of the web.
29. treis ◴[] No.36865788{4}[source]
There's an "or" there.
30. hellojesus ◴[] No.36868208[source]
How would a user ever verify that every attlestation/id check isn't recording their web activity?
replies(1): >>36868280 #
31. Avamander ◴[] No.36868280{3}[source]
Hash and sign functions usually don't allow reversal of those operations. Attestation doesn't require more cryptography.

It's kinda silly to start discussing implementation details of something that doesn't exist. Not to mention considering the alternative which is quite a bit more invasive than having an attested private pseodoidentity would be.

replies(1): >>36869358 #
32. wzdd ◴[] No.36868634{3}[source]
Actually, these two things are orthogonal.

If you require some kind of authentication process to prove your identity, it doesn't matter whether your device has TPM-supported device attestation or not. If Apple or Google wanted to do that, they already have the in-browser infrastructure for it in the form of login with Apple or login with Google. Making such a thing anonymous for third parties (so they just know it's a human, rather than which human) would be trivial.

33. mrguyorama ◴[] No.36869130{3}[source]
I do fraud prevention as my job. The "ridiculous levels of online fraud" isn't happening. There's been a mild uptick in fraud which you would expect from an event that impoverishes millions (covid), but all those people on your favorite website that are so crazy they must be bots spreading misinformation? Nope, those are almost entirely real people. Millions of people are just that awful, hateful, spiteful, dumb, whatever.
34. hellojesus ◴[] No.36869358{4}[source]
I'm less concerned with reversing hashes and more concerned with tracking via the attlestation provider.

What is stopping them from recording the value returned to you that is then passed to the site you tried to visit? Does the data provided to the integrity checker allow for identification? Could the original vendor pass some value to use in the integrity check to prevent replay attacks, and could that value itself encode your personal information?

replies(1): >>36870539 #
35. Avamander ◴[] No.36870539{5}[source]
> What is stopping them from recording the value returned to you that is then passed to the site you tried to visit?

> Could the original vendor pass some value to use in the integrity check to prevent replay attacks, and could that value itself encode your personal information?

Well that value is most likely a cryptographic signature, a "challenge" or a combination of both. Unless there's some separate payload you can't really hide arbitrary data in hashes/signatures that would be used in such a process.

In the end "could" is a very loose word, PII as such is not really part of the process. In this current (Apple's PAT) case, the information is "you have an Apple device", can't currently hide anything else in that.

replies(1): >>36871377 #
36. hellojesus ◴[] No.36871377{6}[source]
Thanks for the response. As a second question, would what prevent someone with an "approved" apple device from firing off a bunch of token requests and then distributing those tokens to different entities for those entities to submit to the origin to pass the validation test?
replies(1): >>36874741 #
37. lifeisstillgood ◴[] No.36871915[source]
So just cohering some thoughts here

Imagine I am Twitter / Instragram and want to be sure that User X is the human owner of the account and just posted a brilliant comment / photo. Or a bank wanting to be sure to move money to a new account.

I can use webauthn to sign a nonce so I can be sure the device sending the request has access to private key for the HSM / secure enclave.

Now if the device is compromised, the OS is under malicious control, does this still hold? Can We assume the secure enclave is proof of the OS fails? I know the secure enclave is basically sealed off and as it is what signs my nonce then yeah I think even in face of OS compromise the webauthn section works.

Yes the nonce I generated has been signed, so the user has the device, but has the user seen the same content / bank transfer details that I am seeing? The user thinks they are sending grandma ten bucks but actually they are transferring 5000 to dodgy account, think they are ordering a sweater on Amazon but actually sending 10 airpods to a new address.

Yeah secure enclaves and other HSM identity systems work and webauthn would greatly reduce the amount of authentication failures - that's a huge win.

And it leaves anti-fraud measures pretty much where they are now - how likely is it this guy wants 20 airpods sent to Alabama?

The thing this is solving is "can we make the entire device as trustworthy as the secure enclave?" And frankly the answer is no. And if you cannot all you are doing then is saying does this device look like a human eyeball which is adjacent to "you cannot browse the web with adblock on".

So I was wrong earlier. This is all about can we trust the user has seen what content the web server ha seen. And no we cannot unless we can verify the whole stack - hardware to OS to javascript. And we are a long way from that.

Maybe we can build a seperate device for that - but really if we could we can build the first one just as securely.

This is basically trusted computing and who gets to sign which binaries?

Webauthn exists and is great and should be used everywhere.

We are fairly sure that the secure enclave / external HSM is so hard to break we can trust webauthn works at all but APT levels.

Any issues over "is the content the webserver gets what the user saw (ie are they compromised) is an issue of fraud prevention.

I have a seperate device from my bank - i have to enter the contents of the transaction. The trust level then is through the roof. Both devices need it be compromised at same time. one has no internet access.

At this poknt it seems obvious who could act as trust providers for content - anyone able to get a simple HSM into my hands as a seperate device.

replies(1): >>36872183 #
38. lifeisstillgood ◴[] No.36872183[source]
So short answer: We need air-gapped HSM with keypads.

Webauthn works great for authentication. we can pretty much trust the secure enclave to verify a nonce even if OS is compromised.

But we cannot trust the content. And it gets high friction. But basically you need the air solex HSM to take a nonce typed in by user and based on human verified values (ie dollar amount) and maybe hash values (though possibly compromised).

And such high friction destroys many assumptions and business models. It might be the best solution - will see if I can find any reading materials

39. Avamander ◴[] No.36874741{7}[source]
They could, but I'm sure there are rate-limits in place against that.
replies(1): >>36877325 #
40. hellojesus ◴[] No.36877325{8}[source]
Good to know. And the rate limits themselves have to apply to user agents in the old style, right? Because there is no identifying information apart from current browser fingerprinting methods. If abused, do we foresee captchas having to be placed as a guard against attlestation abuse?