e citizen workshop at mit v2 paul
DESCRIPTION
Motivating the need for a trusted agentTRANSCRIPT
![Page 1: E Citizen Workshop At Mit V2 Paul](https://reader034.vdocument.in/reader034/viewer/2022051411/547c3641b47959c0508b45f4/html5/thumbnails/1.jpg)
Towards the eCitizenMIT Media Lab
15 January 2009
Paul Trevithick [email protected]
http://incontextblog.com
![Page 2: E Citizen Workshop At Mit V2 Paul](https://reader034.vdocument.in/reader034/viewer/2022051411/547c3641b47959c0508b45f4/html5/thumbnails/2.jpg)
Why an eCitizen?
![Page 3: E Citizen Workshop At Mit V2 Paul](https://reader034.vdocument.in/reader034/viewer/2022051411/547c3641b47959c0508b45f4/html5/thumbnails/3.jpg)
Being carbon-based we can’t to connect to the
Internet
![Page 4: E Citizen Workshop At Mit V2 Paul](https://reader034.vdocument.in/reader034/viewer/2022051411/547c3641b47959c0508b45f4/html5/thumbnails/4.jpg)
So we work through “user agents”
e.g. Web Browser, mail clients, etc.
![Page 5: E Citizen Workshop At Mit V2 Paul](https://reader034.vdocument.in/reader034/viewer/2022051411/547c3641b47959c0508b45f4/html5/thumbnails/5.jpg)
Problem is…
![Page 6: E Citizen Workshop At Mit V2 Paul](https://reader034.vdocument.in/reader034/viewer/2022051411/547c3641b47959c0508b45f4/html5/thumbnails/6.jpg)
We don’t know who is using which agent!
![Page 7: E Citizen Workshop At Mit V2 Paul](https://reader034.vdocument.in/reader034/viewer/2022051411/547c3641b47959c0508b45f4/html5/thumbnails/7.jpg)
So anybody can claim anything
But what’s claimed (e.g. typed into a web form)
can’t be trusted a priori
In other words…
![Page 8: E Citizen Workshop At Mit V2 Paul](https://reader034.vdocument.in/reader034/viewer/2022051411/547c3641b47959c0508b45f4/html5/thumbnails/8.jpg)
“On the Internet, nobody knows you’re a dog”
![Page 9: E Citizen Workshop At Mit V2 Paul](https://reader034.vdocument.in/reader034/viewer/2022051411/547c3641b47959c0508b45f4/html5/thumbnails/9.jpg)
But what if dogs could vote?
![Page 10: E Citizen Workshop At Mit V2 Paul](https://reader034.vdocument.in/reader034/viewer/2022051411/547c3641b47959c0508b45f4/html5/thumbnails/10.jpg)
The dog would need a trusted user agent that can send the
verified claim “I am a dog” on its behalf
![Page 11: E Citizen Workshop At Mit V2 Paul](https://reader034.vdocument.in/reader034/viewer/2022051411/547c3641b47959c0508b45f4/html5/thumbnails/11.jpg)
The dog would need an eDog that can send the “I am a dog” claim
on its behalf
![Page 12: E Citizen Workshop At Mit V2 Paul](https://reader034.vdocument.in/reader034/viewer/2022051411/547c3641b47959c0508b45f4/html5/thumbnails/12.jpg)
i.e. an eCitizen
[If you’re not quite following along here]
![Page 13: E Citizen Workshop At Mit V2 Paul](https://reader034.vdocument.in/reader034/viewer/2022051411/547c3641b47959c0508b45f4/html5/thumbnails/13.jpg)
Identity is consequential
How do we protect the dog from reprisal?
![Page 14: E Citizen Workshop At Mit V2 Paul](https://reader034.vdocument.in/reader034/viewer/2022051411/547c3641b47959c0508b45f4/html5/thumbnails/14.jpg)
Verified Claims + Anonymity
![Page 15: E Citizen Workshop At Mit V2 Paul](https://reader034.vdocument.in/reader034/viewer/2022051411/547c3641b47959c0508b45f4/html5/thumbnails/15.jpg)
Identity is Contextual
We present different faces in different
contexts
![Page 16: E Citizen Workshop At Mit V2 Paul](https://reader034.vdocument.in/reader034/viewer/2022051411/547c3641b47959c0508b45f4/html5/thumbnails/16.jpg)
Multiple identities
![Page 17: E Citizen Workshop At Mit V2 Paul](https://reader034.vdocument.in/reader034/viewer/2022051411/547c3641b47959c0508b45f4/html5/thumbnails/17.jpg)
Around a Common Core managed by
the eDog
![Page 18: E Citizen Workshop At Mit V2 Paul](https://reader034.vdocument.in/reader034/viewer/2022051411/547c3641b47959c0508b45f4/html5/thumbnails/18.jpg)
Identity is valuable
But so is privacy
![Page 19: E Citizen Workshop At Mit V2 Paul](https://reader034.vdocument.in/reader034/viewer/2022051411/547c3641b47959c0508b45f4/html5/thumbnails/19.jpg)
We need minimal, selective disclosure
![Page 20: E Citizen Workshop At Mit V2 Paul](https://reader034.vdocument.in/reader034/viewer/2022051411/547c3641b47959c0508b45f4/html5/thumbnails/20.jpg)
Identity is compositeand socially constructed
It’s what I say about myself AND what others
say about me
![Page 21: E Citizen Workshop At Mit V2 Paul](https://reader034.vdocument.in/reader034/viewer/2022051411/547c3641b47959c0508b45f4/html5/thumbnails/21.jpg)
Composite identities
![Page 22: E Citizen Workshop At Mit V2 Paul](https://reader034.vdocument.in/reader034/viewer/2022051411/547c3641b47959c0508b45f4/html5/thumbnails/22.jpg)
Oh, and it’s my eDog
We need Zero lock-in
(e.g. open standards, competitive ecosystem of eDog providers, distributed architecture)
![Page 23: E Citizen Workshop At Mit V2 Paul](https://reader034.vdocument.in/reader034/viewer/2022051411/547c3641b47959c0508b45f4/html5/thumbnails/23.jpg)
![Page 24: E Citizen Workshop At Mit V2 Paul](https://reader034.vdocument.in/reader034/viewer/2022051411/547c3641b47959c0508b45f4/html5/thumbnails/24.jpg)
![Page 25: E Citizen Workshop At Mit V2 Paul](https://reader034.vdocument.in/reader034/viewer/2022051411/547c3641b47959c0508b45f4/html5/thumbnails/25.jpg)
• eCitizen [trusted user agent] • Verified claims • Identifiability AND anonymity • Multiple identities • Composite identities • Core identity managed by agent • Selective, minimal disclosure • Zero lock-in:
– open standards, – competitive ecosystem of eDog providers – open source implementations – distributed architecture
Requirements