h a l f b a k e r yOK, we're here. Now what?
add, search, annotate, link, view, overview, recent, by name, random
news, help, about, links, report a problem
browse anonymously,
or get an account
and write.
register,
|
|
|
Security protocols like SSL have a 3rd party trust system. When you pull up an SSL website, your browser goes to a trusted 3rd party to verify the identity claims of the website you initially contacted. The trusted 3rd party will then tell you if the server is actually who it claims to be.
The
social analogue of this is you calling the Better Business Bureau after you've made contact with some business. The BBB and your business only have a cursory relationship.
Another way of creating trust relationships is through introduction. If you are introduced to someone through a good friend, you are likely to trust that person more than someone you meet on the street, even if you've read about that person in the newspaper.
So, applying that model to the computer world, you can initiate trust relationships through 'introduction':
You: I need to find a site that offers X service.
Trusted System Z: I know a site that serves X. Let me introduce you to Y.
Y: Hello, I'm Y.
You: Hello, Y. I understand you know a friend of mine.
Y: Yes, I know trusted system Z.
You: You gave me the name of a friend we have in common. Can you ask that friend for a shared password?
Y: Certainly.
Trusted System Z: Here's a password that I just made up and gave to Y: "abracabra".
You: Y, Trusted System Z just gave me a password. Can you tell me what it is?
Y: Certainly. It is "abracabra".
You: It looks like I can trust you, Y. Do you have X service?
Y: Yes I do .
With this system , you can measure how well you trust a system by how close they are to you (how many introductions it took them to meet you), how many links they are away from you, etc.
Also, if a system makes bad introductions to you, you can degrade their trust rating.
PGP "web of trust" explained
http://www.heureka..../sunrise/pgpweb.htm [krelnik, Oct 04 2004]
Please log in.
If you're not logged in,
you can see what this page
looks like, but you will
not be able to add anything.
Destination URL.
E.g., https://www.coffee.com/
Description (displayed with the short name and URL.)
|
|
isn't this the way some search engines work? not for business, obviously, but to assess the validity of a site which has otherwise looked good in keyword trawls? |
|
|
This reminds me of the "web of trust" concept in PGP (Pretty Good Privacy). In fact, I think what you are proposing could be implemented using signed PGP keys instead of simple passwords, so you wouldn't require direct interaction with the third parties. |
|
|
Yeah, I think google (when it first came out) ranked a site by the number of sites linking to them. They've probably modified their strategy some by now. |
|
|
Yeah, simple passwords are a bad idea. Keys or something else I don't fully understand would be better. I'll leave it up to the experts. |
|
|
"I'm sorry, your password of abacabra does not match my password. I'm afraid I'll have to report you to the typo police." |
|
|
I've considered this as a means of personal authentication via the web. |
|
|
It might work if it were done semi-anonymously. That is, both parties enter some uniquely identifying information to begin the process. Then a query engine tries to create a string of trust between the two. |
|
|
I like my way better because there's no need to disclose who trusts whom. With my way, I just submit a list of the people I trust. No one knows whose name I submitted, I don't know who submitted my name. That improves the quality of the connection, in my opinion, because my anonymity allows me to associate myself only with people I completely trust. |
|
|
At the end of a successful transaction (whatever that might be), feedback could be given to the system reinforcing its selection and that particular chain of trust. Negative feedback could do the opposite. |
|
|
Pheonix,
how does your system work? Isn't a unique identifier the *exact opposite* of an anonymous system? |
|
|
I'm sorry, I'm sure you will explain it better in the next post, but right now it sounds hilarious. |
|
|
Pheonix: I'm looking for service Y. |
|
|
System V: I have service Y. What's your unique ID? |
|
|
Pheonix: a7d9a99d92332498d734987cce908098e. |
|
|
System V: a7d9a99d92332498d734987cce908098e? |
|
|
Phoenix: That's what I said, dipshit. |
|
|
System V: Aren't you the system that never shipped my jolt cola for that auction I won and paid you for? |
|
|
Phoenix: I don't think so... Someone else. |
|
|
System V: Another a7d9a99d92332498d734987cce908098e? |
|
|
System V: Another system with a unique ID of a7d9a99d92332498d734987cce908098e? |
|
|
I meant the connections were anonymous. The unique identifiers can be public. |
|
|
The concept of transitive trust is well established (c.f. Kerberos). The problem, at the personal level, is that you might trust me but I might not trust you. How do you document that relationship? If that relationship is public - and you can see I don't trust you - would you continue to declare your trust in me? I doubt it. |
|
|
Those scenarios can be handled in PGP. You can mutually sign each others' keys (or not), and signatures on keys can be revoked. |
|
|
Phoenix -- can you describe your idea a little more? What are the uids for? |
|
|
OR maybe you want to post a new idea? |
|
|
I don't think I can explain it any better than I have, at least not without diagrams. |
|
|
Both of our concepts rely on transitive trusts (A trusts B; B trusts C; so A trusts C). My concept just hides the trust relationships in a database so they can't be tampered with. |
|
|
Can you post an example conversation? |
|
|
How does your database hide the relationship? Who holds that database? Is it a central place? Another party? |
|
|
Well, the way PGP does it is some key trusted parties (one being MIT) run "key servers" where members of the public can store and retrieve their keys, including the signatures that they have gotten from others who "trust" that key. You download the keys you are interested in from these servers, and your local key management software calculates whether you "trust" a given key based on the other keys you have in your keyring. (If A trusts B, and you have A's key and B's key signed by A, you can cryptographically verify the signature locally, without having to talk to A or B). |
|
|
What about your system, pheonix? |
|
|
Okay, sample conversation:
A: Will you take a check?
B: Can I trust you?
A: Let's see!
<A provides his trust code. B does same. A few seconds pass then a confirmation is returned.>
B: Okay, I'll take your check.
<Some days later, after the check clears, B acknowledges the transaction, reinforcing the connection between B and A.> |
|
|
I'm deliberatly vague on the process for providing the trust code and receiving the confirmation because I think it doesn't matter much. |
|
|
How do they communicate anonymously? They are using IP addresses, or what? |
|
| |