23. Digital ID

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free. To make a donation or to view additional materials from hundreds of MIT courses, visit MIT OpenCourseWare at ocw.mit.edu. GARY GENSLER: So this is the last use case day. And then Tuesday we'll wrap up. And I know that you all are preparing for finals and writing final projects. So it thins out at the end. So I thank you all for showing up, those of you that are still here. I also want to compliment. I didn't get through all of the papers seriously. But I did my best to read them quickly last night and today, that were submitted for today. And just like the ones on trade finance, they're really good. And if there was anything that was kind of the learning objective of this-- don't get too happy, James. AUDIENCE: I submitted mine just now. GARY GENSLER: What's that? Yeah. I read it. It was like two hours ago, you put it in. AUDIENCE: I've got a slightly improved version. GARY GENSLER: Oh, I don't think Canvas let's that. That's going to be a double spend wouldn't it? Sure. Send it in. Send it in. It's to show critical reasoning skills. What is this new technology? Why does blockchain technology make sense? And just like in trade finance and identity management, there's data that really matters. And we'll talk about this a bit. But the data really does matter, our identity and so forth. But I wanted to turn back to trade finance, just for a minute, because James had challenged the whole group about supply chain management. And Lauren was a little quiet. But she knows I'm going to call on her. So this isn't a cold call. But Lauren, you want to give your view on this a little bit? Lauren who worked in supply chain management for four or five years. AUDIENCE: Yeah. So the big thing, I worked in supply chain sustainability, and there's been a huge push. The De Beers thing touched on this. There's been a huge push over the past five to 10 years to just increase traceability and transparency through supply chains to make sure conflict minerals going to make sure that things aren't using a lot of water in water stressed areas and things. There's been a huge push for transparency through the supply chain and trying to figure out how companies can basically like audit and assess their suppliers, can take it layers back. And so one big thing now is it's all done through-- most companies do it through assessments. So annually, companies assess their suppliers and hope that they submit all this accurate information and hope that their suppliers are doing the same things throughout the supply chain. But there is very little transparency into it. It's very hard to verify. And there's really asymmetrical information on all sides. So block chain would be, I think, for sustainability purposes. Because right now you're just like hoping that companies are allocating the proper time and resources to go through and track their raw materials and suppliers and things. But there's no real verifiable or transparent way for it to be done. And so right now, a lot of customers are hoping that their suppliers, they're taking them at face value when they say things like, we don't use child labor, we don't source from these certain regions. But there's really no way to verify it. So I think a big opportunity for blockchain and supply chain is helping increase that traceability so that you know you're not coming from places where child labor is OK. Ideally, you're coming from places with good safety standards and things like that. GARY GENSLER: Have we gotten at least-- are you still on the rock bottom minimalist side of supply chain blockchain management, blockchain technology? AUDIENCE: Marginally better. GARY GENSLER: Marginally better. But that's what's wonderful about this class. And even the eight or 10 papers that I read about identity management, identity and access management systems and blockchain technology, ranged. I don't think I read any that were at a zero. There were no absolute minimalists. But there were some of your papers that veered towards that. And Alin, who's going to talk to us probably sometime during the day, I'd say your paper veered towards the most maximalist side I'd seen yet in 23 classes. AUDIENCE: With respect to a certain definition of digital identity, which is probably different than what most people think about. GARY GENSLER: All right. So we're going to hear from Alin maybe in 20 minutes or something. But mind you, that's the surprise of the class. He's moved to the maximalist side, at least on one application for blockchain technology, which is also, I think, the right place to be. This is a technology that might have use cases that work and others that are just hype. There might even be some digital native tokens that will survive. And most, in my thought, won't. But there might be some that make sense, probably more blockchain technology applications than tokens. But we'll start going through identity. Again, we'll talk a little bit about identity before we get into it, identity and access management systems. But what is identity? Then, the sort of management of them, particularly in a digital age. Some state projects in India and Estonia. And then some blockchain technology projects, private sector in essence. And then, of course, some of you might be graduating. And we'll talk about MITs. It is MIT, had to do that. And the study questions were, what are the trade offs. What does it mean to be self-sovereign identity? And how might blockchain technology address that? And we'll see a show of hands later how many of you plan to get your MIT diploma on blockchain. I hope, by the way, that all of you plan to get an MIT diploma. But there are some of you that are from Harvard here and from other schools. So maybe you'll come back to MIT. And then there was a handful of readings which, at least from the write ups, seem like they reasonably did its job. So what is identity? This is an open question. Tom. What's identity? AUDIENCE: I was going to defer to someone who wrote the paper today. GARY GENSLER: You were going to defer to somebody. I see. I see. Who wants to say what identity is? James, you wrote a paper for today. AUDIENCE: You have a birth certificate, identifies you as an individual. GARY GENSLER: All right. So is a birth certificate identity? AUDIENCE: No. GARY GENSLER: Who's saying no? AUDIENCE: I don't think that the birth certificate is an identity because you can also be identified, for example, biometrically or with your fingerprint. So it is not only for birth certificate. AUDIENCE: But it is an identity. Like if you go to the DMV and you're going to get a license, you need a birth certificate to show. GARY GENSLER: All right. But is the birth certificate identity? AUDIENCE: It is not what identifies-- AUDIENCE: It is like an identifier for [INAUDIBLE] GARY GENSLER: Identifier. It's a certificate. Right? Hugo? AUDIENCE: Yeah. I mean, I feel like this is super philosophical question. GARY GENSLER: Well, maybe. Do you feeling uncomfortable with that? AUDIENCE: No. GARY GENSLER: All right. Good. AUDIENCE: Like identity is basically like who you are. And all of the things that prove your identity currently are government issued documents or like school issue documents that prove that somebody else has already done a background check to make sure that you are who you say you are. GARY GENSLER: Brotish. AUDIENCE: I think identity is kind of contextual. So sometimes it can be a date of birth. Sometimes it can be your nationality. Sometimes it can be your face. It depends on the context what identity is. GARY GENSLER: Eric. AUDIENCE: It should be identity is-- going back to the philosophical domain. Identity is what defines you as a unique individual and differentiates you from anybody else. Right? And use additional instruments to serve the purpose of identifying you as an individual to certain contexts, as Brotish mentioned, that the identity is inherent to a person, not an additional artifact, in my understanding. GARY GENSLER: So how many people agree with Eric? It's something unique that identifies. AUDIENCE: I agree. GARY GENSLER: You agree. AUDIENCE: I think it has to be something that you can verify in order to be identity. Otherwise it's just a piece of paper. GARY GENSLER: Wait, you think you have to be able to verify it. But Eric was saying that it's unique. It's something about our humanity. It's about who we are. AUDIENCE: I think, as Hugo said, I think it's very philosophical. I think it's who I am. So like my identity is like what my name, what date of birth, and my iris, and my finger, this is who I am. And I think what you're talking about is more like how can the society verify that you are the one who you claim to be. So I think there's different kind of layers that we're talking sense. GARY GENSLER: Alexis. AUDIENCE: I think it's like not unique in a sense that it's like characteristics that someone has. But like maybe someone else will have the same characteristics. But it's more, Jahib just said, like basically someone can verify that what you say is true. Like if you have these characteristics, that's part of your identity. But it's not like unique in the sense that it's just-- GARY GENSLER: So, Alexis, are you saying your identity is not unique? Or are you saying certain attributes [INAUDIBLE] AUDIENCE: It's unique for me. But it's just like aggregation of characteristics. GARY GENSLER: Aggregation of characteristics. We are going to get philosophical. This is good. AUDIENCE: If you want to get philosophical, you can say that the identity is what the society imposes upon you, or what the society makes up of you. Because, for instance, a name itself is not [INAUDIBLE] itself. It's something that the society or common culture construct. GARY GENSLER: So you're saying it's not just who you are, but how society accepts you. In a commercial sense, in an economic sense, identity is used for so many things. I do believe-- and maybe it is philosophical. I do believe that we are each unique souls. And so that's a belief system, maybe. But in an economic sense, we have various attributes. So those attributes might be shared. I know, in fact, yeah. Woo. So what is identity? There is a dude up there that I share DNA with, exact replicable genetic material. But I, for one, think that I'm unique from him and I have a different identity. And you can be guessing, while you pull this down from Canvas, who's who. It's not a test. What's that, James? AUDIENCE: You're on the left side. GARY GENSLER: I don't know which side you're pointing to. AUDIENCE: Technically, the left side of the photograph. AUDIENCE: You're on the-- [INTERPOSING VOICES] AUDIENCE: As we see it, on the left side of the photograph. GARY GENSLER: I see. Yeah. Yeah. You're correct. But see, we're unique. Different identities. Same DNA. Who has an iPhone with face recognition? So on Thanksgiving, Rob hands me his iPhone. He says, what do you see? He says, just look at it. And I look at it and I say, I see a bunch of text messages. Why? And he cursed. And he said, I handed you my locked phone. So whatever you think about biometrics and iPhones, it didn't work. Or it does work. I don't know. So I handed him back my iPhone, which a little older. And I said, could you open it for me with your thumb print. And he couldn't. So just for now, we have a number of sets of identical twins in my father's family and so forth. So he tried it with two of our identical twin cousins, two women. And they, too, can open each other's phones. AUDIENCE: With fingerprints? GARY GENSLER: No, with their face recognition. Not with fingerprints but with face recognition. So it just is a little side story about identity. Eric. AUDIENCE: Just a comment that there's a function in Facebook that shows you a list of photographs that you potentially can be identified and tag you. So I keep getting pictures of my twin brother, too. So, yeah. Very poor face recognition today. GARY GENSLER: You're identical? AUDIENCE: Yeah. GARY GENSLER: OK. When I hear fraternal, then I have another thing about Facebook. AUDIENCE: But there is actually a much simpler way to define identity. Philosophy aside, there is this physical human being, and there's billions of them on the planet. And one simple way to think about it is you want to hash each person. GARY GENSLER: All right. We're back. We're back to the hash functions. This is good. AUDIENCE: But that's actually what you want to do. You want to hash each person and get a number. And the property of that is that if you come to me and I hash you, I get some number. And if you come again, I get the same number. So I know I'm dealing with the same person. GARY GENSLER: Even if I put weight? AUDIENCE: Even if you put on weight. I can hash because I can use your iris, let's say. Then your twin brother presumably won't have the same iris. I'm actually not sure, but I don't think you will. So now a hash you, I get the same number, I know who I'm dealing with, and this solves a lot of the problems in the business world. Like KYC, getting a credit card at a bank, stuff like that. And it also solves the problem, are you a new customer. Well, is your hash one of the new hashes that I-- is your hash a hash that I've seen in the past? So that's a very simple way to think of identity. And you put philosophy aside and you assume that there is some physicality of human beings that you can distinguish between using a hash function of some sort. So the question is like, how do you implement this hash function. GARY GENSLER: So you're not really putting philosophy to the side. You're saying, that may be all well and good, but you can also take a physical object, a human, apply a hash function, a cryptographic means, and get a unique identifier for that individual. AUDIENCE: I have a counter question to that. So let's say you hash everything. I can have a counter feed of like five things that can essentially be the same thing. And you'll just have five different hashes for it. Right? It will still have to come from a non-blockchain source for you to be able to-- AUDIENCE: Well, it's not things. It's human beings. AUDIENCE: OK. But for you to be able to hash one person, you can still reproduce five other fake people and have five different fake identities with a different hash. AUDIENCE: So that's the difficulty, right? You can't actually-- if I hash myself and I get a hash, you will have a lot of difficulty producing another human being. It's like finding the collision in the hash function. You have a lot of difficulty producing a human being that has the same hash as mine. Because the hash function is collision resistant. And it's hard to come up to clone me 100%. For example, my retina, even if I give you all the data behind my retina and you have it, it's very hard to produce a retina in your own eye that you can scan and pretend to be me, for example. That's one way to think of hashing somebody. You just scan the retina. And even though you know the full retina, it's of no use to you because you have to put it in your eye and go there and get scanned. And it's like, OK, fine. Well, our medical technology is not there yet. GARY GENSLER: [INAUDIBLE] And then we're going to move on. AUDIENCE: I'm just going to say, if you want to take it-- it's not even your physical representation. Right? Because you can change what you are physically nowadays. And so it's like what you know, what you are, and what you have, the three things that you can put into this hash function. AUDIENCE: Well, it should be-- it should be. You're right. It's not the whole of you. You have to do it very carefully. So the question is, how do you [INAUDIBLE] person. Because if you go by weight, let's say the hash function is your weight. Well, that's bad. Because you get collisions. So you have to do it very carefully, for sure. GARY GENSLER: So, Eric, did you have something to add? AUDIENCE: [INAUDIBLE] But actually, the main point of your elaboration is the biometrics behind the whole-- because it's not the hashing that's making this possible. It's the biometrics. Because you have to actually hash something. When you come from the abstract construct of saying, hash somebody, you're actually saying, you're hashing some biometric attribute that has to be unique to get the hash. AUDIENCE: I'm sure hashing a person is an abstraction for, let's say, take a biometric, it's actually collision resistant. AUDIENCE: The point, the really important point, it comes to biometrics. AUDIENCE: That's right. That's right. And then the question is, well, biometrics get stolen. How do you deal with that? Then you have to be very careful with it. There's nowadays, you can actually, if you aren't careful, it can get stolen. GARY GENSLER: [INAUDIBLE] AUDIENCE: Yes. So to Eric's point, I think that's still an identifier. It's not really your identity. Because like you guys are saying, you can replicate somebody's retina, let's say, 1,000 years or 10 years down line, I don't know. AUDIENCE: Perhaps. That's right. That's right. AUDIENCE: Or they replicate somebody's fingertip. But that doesn't mean that you're replicating their entire identity. So I like the idea of hash somebody's identity, hashing a person. But I don't think it's just hashing their eye or just hashing their-- AUDIENCE: That's right. But I think you're getting philosophical. I'm looking through the perspective of a bank, a verifier. What does a bank actually need to do? It just needs to map everybody to some number. And when you come back, it needs to figure out which number you are or if you're a new number. That's all you need. And then, problem solved. And then by the way, personal data attributes, you just link those to those numbers. It's not a difficult problem. It's an orthogonal problem. You solve that [INAUDIBLE] GARY GENSLER: So let's agree that-- what Alin is saying is he's not talking about our soul or our unique identity. He's talking about something that a verifier or a bank might be able to do. And then you could say here's 7 billion people on the planet now. And there'll be 10 or 12 billion one day. But you could take each one of them and somehow have a unique identifier, a hash function, that has each of those. Don't do it off of DNA though. Because Eric and I, you know, and hundreds of millions of others would-- so DNA is not a unique identifier for true identity. So the concepts of identity for things that I think about sometimes, some of the papers were about three. But there's attributes, a claim, a credential, an attestation. What would be an attribute? Just any old attribute of a-- anybody? AUDIENCE: Your retina. GARY GENSLER: Your retina. Or it could be your age, address, citizenship, name. A claim is, my name is Gary. Or a claim might be, I am so old. Or I am a US citizen. Or a claim might even be, I have $5,000 in my bank account. There are other forms of claims. Or I do have a bank account at Bank of America. I don't think I have $5,000 in it right now. No. A credential is what we started with. I think James mentioned it, a driver's license, an ID card, a utility bill sometimes. I mean there's hundreds of forms of credentials. We think of the governmental credentials. The history of credentials is interesting. The first tens of thousands of years of human kind didn't have any. And we started to have them. Passports really aren't even that old of an invention. In the 16th century, the King of England had some pass boarding. But it was so that his citizens could be recognized in other countries. It was so that their rights would be respected and somebody would not be messed with. I'm under that sovereign, don't mess with me. But in terms of a true permitting system, it was largely implemented about 100 years ago. Anywhere between 100 and 150 years ago. It's not that old a system. But it was all paperwork. And I don't know if any of you have ever asked to see a grandparent's or great grandparent's or an ancestor's passport or those documents, if you have them. But they're intensely paper. In fact, if they're from the late 19th century, there's no photographs. They started to have photographs in the early 20th century. And so it's a big change. And the last 30 or 40 years of digitisation of this has actually made it a little harder, in some ways. I mean there's efficiencies. But it makes it harder. And then attestation is that third party verifying it. And that's what Alin was talking about. If somebody can verify your identity, they're basically-- I make a claim. My name's Gary. I might give a credential, my passport to show it. The picture looks like me. A human looks at it. Lines it up. Says all right. You can enter the country of Germany or wherever I'm traveling. They don't actually know that I'm really-- but they do some verification. So those are the big kind of pieces. Identity and access management systems, the functions-- and these are just taken from a bunch of readings-- authentication and then authorization. Authenticating that I have the bank account. Authorization, I can use it. Or authentication I'm a US citizen. Authorization, I can come into the country of Germany. So based upon some attribute, somebody authorizes me. Or something that maybe some of you have dealt with at some stage of your life, that first time you went in and handed a driver's license in so you could take a drink at a bar. Let me make it tangible. That's like authenticating, do you look like that person. And then who are the parties in this system? Users, service providers, identity providers. Anybody want to tell me about this ecosystem at all? Alfa, you didn't write. You wrote last time. Tom. AUDIENCE: Again, I didn't write. But the idea of identity provider is interesting. It fits in our conversation, right? If we're talking about your identity being who you are, it's really identity verification provider. They're providing the documents. GARY GENSLER: I think that's right. I mean, in a sense. Though identity, in a more philosophic way, is who you are. But yes, the identity provider can be somebody like the state of New York or the Commonwealth of Massachusetts, birth certificates, death certificates, marriage certificates. Attribute authorities, like certificate authorities, are kind of a more recent invention. I don't know that they existed 100 or 200 years ago. But an attribute authority says, these attributes, we'll validate them. They're central authorities that say, yes, this is correct. And certificate authorities are particularly an invention of, what, 40 years maybe. The internet, 30 years. AUDIENCE: I think the thesis was an MIT thesis in 1976. GARY GENSLER: 1976 thesis at MIT. AUDIENCE: If I remember correctly. GARY GENSLER: Did anybody want to say what a certificate authority is? Because they're in the middle of all of that. By the way, every time that you go to the internet today, a certificate authority is involved in that transaction, probably 100 billion times a day around the globe. Yeah, that's probably the order of magnitude. Probably 100 billion times a day, a certificate authority is used. Alin, you want to-- AUDIENCE: Sure, yeah. GARY GENSLER: Certificate authorities are how we access the internet all day long. AUDIENCE: You want an explanation for what they are on the web? GARY GENSLER: Yeah. AUDIENCE: Right. So on the web, you have a bunch of websites. Let's say you have facebook.com and you want to visit it and give it your password. So if you have evil people like me, I might set up a fake server and pretend to be facebook.com, mess with the DNS records, get you to visit my server. When you type www.facebook.com, you visit my server. But you can't tell. GARY GENSLER: DNS is Domain Name Server. AUDIENCE: But anyway, the idea is that when you actually do a look up from facebook.com from an IP address, that's actually very insecure. And attackers can mess with that and redirect you to their servers. And they might completely replicate the Facebook page so you might think you're interacting with Facebook. But you're not. You're interacting with an attacker website. And you type in your password and your user name, and then the attacker steals it. And then he just redirects you to the real Facebook and you won't notice the attack at all. Does that make sense? GARY GENSLER: And it all happens in nanoseconds. AUDIENCE: Right. And it's called the man in the middle attack. So what you do is you use public key cryptography to solve that problem. You say, OK, let's give each website a key pair. So facebook.com will have a key pair, a secret key and a public key. So now, the question is, well, there's a public key for facebook.com, but how do you know you have the right public key for facebook.com. Because an attacker could also give you their public key their fake facebook.com. So now, how do you distinguish between those two? That's where the certificate authority comes in. So the certificate authority signs these public keys. And you have the public key of the certificate authority. You have a signature from the certificate authority on the public key of facebook.com. You're now ready to trust that you're dealing with the real facebook.com and you can encrypt your password to facebook.com using your public key. There's a lot of public keys around. I know. I'm not sure if that made any sense. GARY GENSLER: So we earlier learned about public key and private keys as part of blockchain technology. But know that when Satoshi Nakamoto wrote that paper, she was just using asymmetric cryptography, public-private key cryptography, that had been invented really in the 1970s. And then it adopted, as the internet came along, and took off and had a lot of use in the 1990s to secure the internet by 1996. And the way that the internet's secured on TSL and SSL and these various ways it's secured was public key-private key cryptography, a full 12 years before Nakamoto wrote the paper, but used for a different case. But Facebook has a public key. And all those public keys of all the websites that you visit every day, there is a central authority called a certificate authority. There's actually a 100 plus certificate authorities. But certificate authorities that say, this is the Facebook public key. So that when you go to your Facebook or you go to Google or you go to shop on Amazon, you know you're actually-- so that's a corporate or that's another form of identity. It's not one with soul, I would suggest. That's not a negative thing about Facebook. I just don't think websites-- but you all might have a different philosophy. I didn't think websites have soul. Brotish. AUDIENCE: It's not clear to me how, as a user, I know that I'm going to the right website. I understand certification happens [INAUDIBLE] But how do I know that I have the right website. GARY GENSLER: I'll try to do it in lay terms. And then you'll hit it. There's kind of a handoff that when you send that signal, you're trying to access-- is it Facebook? You're accessing Facebook. They send you some information, including their public key that you're-- in essence, a certificate authority is automatically checking. But Alin will give you the more technical. AUDIENCE: Let's use a simpler example. Let's say you want to go to New York Times and you want to read a headline that says something about some important things, like tomorrow there's going to be a snow storm. Obviously you want to know if you're dealing with the authentic website. That seems to me the problem. So how do you deal with that? Well, remember the New York Times will have a public key. It will have a corresponding secret key. So you visit their website. It turns out that when you download the website from the New York Times with that announcement about the snow storm, that's actually signed with their secret key to verify the website that you get. You verify it against their public key. And you know that only they know the secret key. So only they could have offered that information and signed it. So then you know you're dealing with the right website. It's literally the New York Times sends you a signature over every piece of information they send you. And you verify it against their public key, which in turn you verified it from a certificate authority. GARY GENSLER: If you remember the little bit of broccoli we did earlier this year, that asymmetric cryptography with a public key and a private key also has digital signatures. So you have, now, two things. Let's go back to Bitcoin. In Bitcoin transactions, you have a public key. And then somebody signs a transaction. And the math behind it, the cryptography behind it, is a signature and a public key that come from the same private key. There's a way to do a function to check that they came from the same private key. And the heart and soul of what was invented in the 1970s was not just that there's a public key and a private key, but also that you can digitally sign it. And then when the digital signature is compared to the public key, it's unique if they came from the same private key. So going back to the New York Times, the New York Times you have both their public key and then each headline, each piece of information has a digital signature. And of course, you do have a centralization, a lot of centralization, on the internet related to these certificate authorities. Eric. AUDIENCE: Just a point maybe to clarify, this is performed at a protocol level. That is not the user witnessing any of these interactions. It's done at the top of the TCP ICP stack, this TLS, which is the security protocol that works with HTTP, which is web. And this is where you find that this little lock in the browser that's guaranteeing that that's the website you're visiting. Because the whole exchange of information that includes the public key from the website and the verification is done by the browser. You don't do anything interactive. GARY GENSLER: We don't do anything. That little lock has that meaning. And you could actually see what certificate authority. I only pause on that to pause not only to tie back earlier conversations about public and private key, but the whole internet is reliant on these certificate authorities. And blockchain technology might be a way to step around and have a new paradigm. Kelly. AUDIENCE: So for a contextual example, say I'm trying to access my brokerage account or whatever. And say I forgot my password. Or every month, they want you to replace this or that to protect your account. How does a person interact with these various parties going through that process when it's trying to verify that it's you gaining access? What are the points of contact for those? GARY GENSLER: There is an initial layer, which we were just talking about, that you're actually dealing with you're-- I don't know. I'm going to make it up. DE Shaw. Or no, that's a hedge fund. With-- AUDIENCE: Bank of America. GARY GENSLER: Bank of America. Fine. That you're really dealing-- so that's what we were talking about that. They are Bank of America. And you're really dealing with Bank of America. And you don't even participate in that. But then there's another layer that if you've forgotten your password, they're going to ask you a bunch of questions, like the usual questions about who was your first pet and who was your first significant other and things like that. But at some point in time, they'll freeze you out. AUDIENCE: That's the service provider that you registered with. That's Bank of America. GARY GENSLER: That's Bank of America has their anti-fraud provisions. What we were just talking about is really at the internet browser. And in essence, Facebook is the one that's trying to be identified. 100 billion times a day, some human around the globe is trying to be protected, that they know they're dealing with the right identity on the other side. We were talking about human identity. There's also the identity of the websites. And that's what we were just chatting about. Let me move on. And then if I've left you confused, because you were asking about what happens if you forgot your password-- AUDIENCE: Right. Like how do they verify you, not you verifying them. GARY GENSLER: How did they verify you? I would contend it's still kind of a little archaic. I mean, it's a little bit like if you forgot your-- a couple of times you use a username and password, and of course if you have dual authentication, they might send you a notice to another text message or something. But if you've forgotten your password, then it's literally backdoor sort of saying, well, to remember your question. I never remember the questions. I mean who is your first friend in elementary school? What was the first car you drove? It's crude. And then they usually freeze you out for fraud protection after two or three times of trying that. And almost always, there's something where they can send it to you another place. Identity management, some of the pain points. What are we trying to solve? And why would blockchain technology maybe help us out? Privacy and security is a big one. There are a lot of thefts, identity theft. How many people are in the room have had their credit card-- this year, in 2018, we're 11 months in-- have had their credit card have to be replaced because the bank got in touch and said it's compromised? Only about 20% of us. I would have thought it was going to be more. I feel like I get one of those calls every 18 to 24 months. Maybe I shop too much. Or my daughters are using my card too much. AUDIENCE: [INAUDIBLE] big enough to be a target. Student banks tend to be negative. GARY GENSLER: You think that's it? I just assume that some merchant has been hacked again. I mean, every time a merchant loses 1 million, or 100,000, or 50 million accounts, then the banking system needs to send out those notices. I chair a commission, Financial Consumer Protection Commission of Maryland. And the credit union advocates in Maryland came to our commission and said, we need some help. We banks and credit unions have to protect a lot of data. But every time a merchant loses data, it's us credit unions and banks that have to replace all the credit cards. And they feel there's an asymmetry, commercial asymmetry, that the banking sector is bearing the brunt of other merchant's, non-financial sectors, data breaches. And should the state of Maryland-- this is a live issue actually in front of our commission. Should the state of Maryland change its laws to put higher cybersecurity responsibilities on non-financial sector actors? And the financial sector would say, yeah, that kind of feels you'd be leveling the playing field. And the merchants are saying, you can't do that on every grocery store and bar. It seems like it's a little out of sync. AUDIENCE: Yeah, I was going to say that credit card theft like this is a perfect application public key cryptography. The [INAUDIBLE] don't give out your credit card number to these folks. Your credit card should have a key pair. It should have a secret key and a public key. And you give your public key to Amazon. And then how do you pay Amazon? Well, you sign with your secret key that's on your credit card. So nobody knows your secret key. It's on your damn card. Never lose that card. And problem solved. They can steal as many public keys as they want. Problem solved. Same thing with the SSN. Why would you share that-- GARY GENSLER: I disclosed to you. He became a maximalist, almost. AUDIENCE: [INAUDIBLE] I'm talking about public crypto here, not without consensus. Although, consensus can be a very important part of all of this. GARY GENSLER: Almost. Almost. All right. So let me just hit. So in terms of the big pain points-- privacy and security, a bunch of identity theft, forged credentials, back to the passport or the driver's license or the credit card, a forged credential, whatever that is. And of course, just how do we update our personal identity for any time we move? And this term PII is three letters you'll learn in business. Because at some point in time you'll be running a business and somebody will be coming in, your chief of information officer, and say, we've had a breach. And unfortunately we broke some laws, too. Because in the US and in other countries GDPR, you have to protect certain data. And it's usually called PPI. It's usually the bucket of data you need to protect. But every time you update your personal information, how do you how do you keep it updated? Ross, was there a question? AUDIENCE: I just had a question back on your Maryland example. I make the assumption, maybe it's wrong, that if your commission allows the banks-- or passes that regulation-- GARY GENSLER: We're just an advisory. But if we recommend to the General Assembly. AUDIENCE: That the banks are not going to lower their fee to the merchants. So what's the dollar number that they're trying to push? In other words, I'm trying to size the pain point. What's the amount of cost to those banks that they're trying to move to the merchants and thus drop from the bank's bottom line? GARY GENSLER: I don't have a figure. It's a very good question. What we know is that the overall statistics on fraud and credit card is, I think, high teens basis points. I can't remember, 15 or 18 basis points but less than 20. And it's more than 10. So Visa Network charges 270 basis points or so. And the fraud part of it's 15 or 18 basis points. AUDIENCE: And the issuing bank gets how much of the 275? GARY GENSLER: 200 or so. AUDIENCE: Yeah. So they want to [INAUDIBLE] whatever that is. GARY GENSLER: But I don't know-- and this is particularly credit unions are coming to us and saying there's an externality, the merchants, the gas stations. All right. So you're saying, I know which way you would vote on our commission. So what's going on a little bit about data breaches? I just tried to sort of list anything over 100 million customers. But then I had to put Facebook in because it was 50 million. But these are just like a dozen or so really big data breaches. There are so many data breaches in 2018 alone that you couldn't list them on a page like this. This is the last five years of 100 million people or more data breaches. So there's a problem here in cyber secure. And this is just the US. Brotish, didn't the Indian system-- AUDIENCE: [INAUDIBLE] more than a billion. GARY GENSLER: 1.1 billion people's IDs were hacked in India. It was announced in January of this year. And so, it's a lot going on. And every once in a while, politically it captures the attention of particularly Equifax did, Facebook does. Wells Fargo, I think the breach was 3 million. It's not even on this. It wouldn't get to the 50th page by size. But Wells Fargo had other issues that was capturing the public attention. Kelly. AUDIENCE: Just taking the Marriott one as an example, that's been the most recent one in the news, I think. It's so costly to these corporations. I think Marriott even said that they would pay the fee to replace passports for those affected. I mean, maybe it's a drop in the bucket for them. But in terms of the value in pain points, sort of like you were talking about, it's a lot. GARY GENSLER: It is a lot. But one of the challenges that blockchain technology solutions is adoption. How do you get Marriott to contribute to a new system if you come up with a really clever, creative, new system? Because there are so many thousands of merchants that are trying to deal with their cybersecurity risk. And Marriott, all of a sudden, has all these costs. But how you get them involved in your new blockchain technology solution, I think it's just an adoption issue, which somebody might solve. Or as Ross says, well, wait a minute. If the banks were to just [INAUDIBLE] right? AUDIENCE: If they want to cut the fee and let everybody else-- then that's fine. But the merchants have no bargaining power. GARY GENSLER: That's true. AUDIENCE: So they cut the fee. GARY GENSLER: So a couple of state identity projects. Estonia has e-identity. They started in 2002, well before blockchain technology. And it's run on a software called X-Road software. And while some folks might think of Estonia as a blockchain friendly nation, does anybody want to take a guess whether this software has blockchain technology? What's the consensus? No. It's not. That doesn't mean it doesn't work. But they've sort of wrapped themselves in this sort of spirit of we're a blockchain nation. And they also have e-health records and many other records that are going online. And it may be, at some level, inspired by that. They have 1.3 million people in Estonia. I think a bigger state actor in the challenge-- sorry, Brotish-- is Aadhaar. So there's a national identification system. And it was promoted really for inclusion, financial inclusion, and a way to get government assistance and welfare to hundreds of millions of poor. India at the time that it was rolled out, well over half of India did not have a banking account at all. 12 digit ID and biometrics, being fingerprint and iris scan, I think they would deal with the identical twin issue. I think, from my little example that my twin brother Rob's finger didn't open my iPhone. But there's been a lot of problems. And that's not a blockchain project either. But my read of it is Aadhaar-- and maybe Brotish has some views-- has done some very positive things in India. But it's also come with some very scary things. Brotish. AUDIENCE: It's a quick nugget of information about Aadhaar. It was the fastest system in the world to reach 1 billion users, faster than Facebook or any other online platform. And [INAUDIBLE] optional, I mean it was not a mandatory system for people to get it. It was optional system. But it was the fastest one to reach 1 billion. GARY GENSLER: But it's optional. But you can't get your government assistance any longer if you're not in it, right? AUDIENCE: It's not like that. So actually, there has been some government efforts to make it that way. But then the court actually rejected those proposals. So they said that you cannot make it mandatory to make people receive benefits based on this. So whoever has that, they might have some ease of obtaining those benefits. But it's not like without it, you cannot get [INAUDIBLE].. GARY GENSLER: So Brotish is saying it accurately. But the court only ruled that this year during 2018 I think. And for a while, hundreds of millions of people thought that's the only way I can get my assistance. But the 12 digit ID and the biometrics has produced a system where, along with a payment system where you can do a QR code right on your iPhone and get goods and services, and it's pretty efficient. But it's one national system. One national system and there's been a lot of challenges. Not just the hack, but also some mistakes sometimes. And based on those mistakes, people feel like they've lost their identity. I mean, they're still this human that they are. But they've lost it in a governmental sense. And thus they've stopped getting their assistance. And there's occasionally reports of suicides, and reports of deaths, and things like that where people are no longer recognized in the system because of their Aadhaar ID. So there's a lot of public debate in India about the net benefit versus some of the costs. Self-sovereign identity, four things I think about. People and entities control their identities more than we have now. This is a concept. We have direct access without some intermediary. Our identity is transportable. But not our human identity, but the attributes of our identity. So I use the term more loosely here. And then, it's widely usable or interoperable. Self-sovereign identity-- what's that? AUDIENCE: I was just thinking [INAUDIBLE] GARY GENSLER: Yeah. I kind of remembered that back and forth. Self-sovereign identity does not rely on blockchain technology. It's a concept in a debate about should we go back to something that we, in a sense, had in the 19th century and even early 20th century that we could walk into any store and there might be other forms of censorship. There are certainly many prejudices and racism and all sorts of challenges. But we could walk in without a document. We weren't walking in. We might have some gold, some money in our pocket. They would take the gold coin or the silver coin. Self-sovereign identity is also thinking about can we have the individual hold their credentials as we held a physical passport but hold it in a wallet in some way. Ross. AUDIENCE: Just your example of the 19th century ties into the question that I had, which is doesn't this only work if you also have a decentralized money system. Like go to your example. Only reason that works is because people could go in and pay with a completely anonymous form of money. Unless you have a real broad, say, Bitcoin distributive system, your bank will require you to waive this. When you sign up for a bank account, you will have to waive this. And it's gone. They just will. GARY GENSLER: So Ross is raising, well, will this even work unless you have a truly decentralized money system. I don't think it's reliant on a decentralized money system. I can see your point that it's benefited by a decentralized. AUDIENCE: Any commercial transaction you have, the counterparty-- Facebook will make you waive. Because they want the information. And Google, that's right you could cut yourself off from all those things. But they'll just make it as part of the contract, part of the access, that you waive. GARY GENSLER: So self-sovereign identity, concept that all of us humans could control our identity, not just our birth and our nationality, but maybe even our digital footprint, our spending patterns, and so forth. And Ross is raising, well, maybe Facebook and Google wouldn't transact with us as a commercial reality. You're saying their market power, they might cut us out. I think some might try. And that will be-- this hasn't been really adopted, self-sovereign identity. AUDIENCE: Hell of a question for you Consumer Protection Commission. GARY GENSLER: Yeah. Maryland probably won't be able to weigh into that too much. The benefits of taking identity access management systems onto the blockchain technology, and eight or 10 of you wrote papers on this. Does anybody want to comment on-- this is like, my summary, some of the benefits. You can address verification costs and fraud. You could potentially lower some of the cost and fraud. I think you can trace provenance. You deal with censorship and so forth. And truly, I think you can help on privacy. But the challenge is-- the real challenge is that if you're storing personal identifiable information on a blockchain, blockchain technology works by distributing the data to all the nodes. And so the initial write ups, three and four and five years ago, were, like, well, could you put self-sovereign identity in essence in a blockchain and store it? And everybody started to say, no. You really can't do that. Because you're not going to put all my personal stuff on 10,000 nodes. AUDIENCE: So I mean, the first benefit there, I think, should be prevent identity theft. Because the main security goal of any identity scheme, including the one I described, is you want to prevent identity theft, to prevent impersonation-- GARY GENSLER: I'm sorry. I'm going back. I just chose not to read through this page. I'm agreeing with you. I mean, these are the pain points it would all address. AUDIENCE: And in general, I think, when you think about identity, you have to look at it through that lens. Because what else is identity for if it's not for preventing people to claim they're someone else? That's what an identity scheme does. If your scheme doesn't address that fundamental problem-- like by the way, all of these startups don't. Because SSN numbers are still out there and require [INAUDIBLE]. So as long as that's-- GARY GENSLER: Social Security Numbers. AUDIENCE: Yeah. Say goodbye to prevent identity theft. What are you doing then? GARY GENSLER: I think, I'll go here and then Hugo. AUDIENCE: Yeah. And something that was not very much addressed in the readings, I thought, was also the fact that if you used a blockchain technology, so evidently not. It's immutable. So it's often seen as a good thing. But here in this case, normally, like for example in Europe, normally in the internet, you can request to delete information you have if Google has a link which mentions you for instance. But here, you wouldn't be able to do it. Because the information is there. If someone steals or even if you want it deleted it, somehow you can't because it's immutable. So how can we deal with this? GARY GENSLER: So you're raising a point that in Europe under the new privacy law, the GDPR, you have a right to be forgotten or right to be deleted. And so how can blockchain technology interact and work within that framework? If your actual information is on the blockchain, I think you're right. I think it's very hard. But I do think there are solutions if it's just a hash of your information that's being stored on the blockchain. AUDIENCE: Yes, but they were mentioning in the reading as well the fact that you can store all the data, basically, of the blockchain. And then when you transfer it, you just say like as a certification, oh, yeah, this is my information. And it is true. You can verify it is true. But you cannot have like-- GARY GENSLER: The actual information on a distributed network. Kelly. AUDIENCE: I think that's a really interesting point. One of the sort of use cases I think of goes back to the original attributes you were talking about. So for example, what about citizenship? If in your digital identity it says you're a United States citizen and that changes, can that be changed if it's immutable, A. And then B, what about those privacy issues? For people that do not have, maybe it's not a fully verifiable citizenship, then we have a whole host of problems there as well. GARY GENSLER: So I think you raise a good question. But this is one of the challenges of any identity database. But it's also a challenge of a money database called Bitcoin. You have ownership today. And tomorrow you might no longer have the coin. Today, you might live in Massachusetts. But a year from now when you get your fancy job and wherever you are, you might not live in the Commonwealth of Massachusetts. So I don't think it's just citizenship. It's just the updating the records and the attributes, that you no longer can vote here, can no longer-- AUDIENCE: It just goes back to the trade offs that we were originally talking about. There's a lot of-- it certainly helps a lot of things like preventing identity theft. But there's also a lot of other [INAUDIBLE].. GARY GENSLER: They're challenges. But I think that challenges is surmountable. AUDIENCE: But even though it's immutable, you can append new information. So isn't that the whole purpose of blockchain. Your citizenship may change, but then you append new information saying that your citizenship has been updated. And that becomes the source of truth now. GARY GENSLER: I'm agreeing with that. I think that's correct. I think that's a solvable challenge. Hugo had his hand up. And then we're going to go on just to-- AUDIENCE: So I'm going to question the idea that having a blockchain means identity theft is no longer an issue. I think it makes it a bigger issue. What happens if you lose your private key or if somebody finds a private key or somebody cuts your eye out or whatever? But really, if somebody steals your identity, then it's gone. You're not getting it back. GARY GENSLER: Oh, steals your private key. Your identity identity is stolen. AUDIENCE: Steals your private key. If you don't protect that with your life, then your life is gone. GARY GENSLER: Right. I think Hugo's raising the right question. But that just means that's not the right solution. You can't pin it all on just one private key that's lost. AUDIENCE: Well, the answer is also use multiple biometrics. And yes, sure, if you lose your hand, your eye, your retina and you go to the DMV, maybe they'll make an exception for you. Hopefully like 10 people ever show up that way. GARY GENSLER: Let me try this-- plow in for a second of what are the projects. And this is a short representation. I could have made three more pages of representation. I'm going to hit three or four of these just for fun. There's three or four that are ICOs. I'm going to choose to skip all of those. But there are, I want to mention that Civic Secure Identity, Existence IC, Sovrin which gets-- S-O-V-R-I-N-- but Sovrin that gets a lot of write ups in other papers were all ICOs, Initial Coin Offerings, to use a token to incentivize a system of, usually, self-sovereign identity at some point. None are up and running yet. And I have my doubts about some initial coin offerings. But there are three or four. And there were probably six or 10 others that I didn't quickly find. Bitnation's an interesting project that literally you can voluntarily get a citizenship in Bitnation. It is a decentralized borderless voluntary nation. But the keyword is voluntary. They don't have a UN membership. They're not part of the World Trade Organization. They have no geography. But the concept is, you can get a Bitnation passport. And you can get some authentication through that about some attributes about your birth and things like that. There is a standard setting group, Distributed Identity Foundation that we're going to talk about in a minute, and I'm going to show a slide, which is just a whole bunch of efforts coming together and saying, well, maybe we can do some standards around this. And then there's Rebooting Web-of-Trust that runs events. I think their only economic model is to make money on the events. But some of their research and some of their papers are very interesting, that you can read about this. And not listed on this, one area that's spending a lot of time on self-sovereign identity is the World Wide Web Consortium, W3C. You can go and on GitHub you can read all sorts of information from W3C about self-sovereign identity. And they're promoting ways to do digital ID, and trying to form standards. So I think W3C, which is not really a blockchain project, and this Distributed Identity Foundation, for any of you that are actually interested in pursuing some of this, you want to stay abreast of it. Because it's the standard setting also that I think will be relevant. But questions or thoughts for those who have done research on some of these? Other than Alin who we've heard from a bunch. All right. What's your question? AUDIENCE: Well, my first thought is they don't solve identity theft in the United States. GARY GENSLER: They don't solve identity theft in the United States. AUDIENCE: Why? Because there's a certain policy by the US government that asks everyone to accept SSNs. And if James has my SSN, then James is me for all intents and purposes. So that is a policy issue. So these companies are basically a very inefficient way to change the policy. Hundreds of millions of dollars being invested in all of these guys. And by the way, all of them do public key crypto. It's not like something revolutionary here. But at some point, some of them will get some market share, maybe convince a few banks. And maybe those banks will convince the government to start doing-- GARY GENSLER: So you're saying that an underlying challenge, at least in this country, is that we have an antiquated public policy related to a tax ID called social security number. And initially, social security numbers were not even a tax ID. Initially, they were to participate in a retirement program called social security. And you were not legally required to have a number in the 1930s or '40s when it first came about. I didn't get my social security number until I was 14, I think. Now you pretty much get them at birth in this country. You can't use it for much. You're not working. But you're saying it's a public policy challenge, at least here. I would say in every country, there's some public policy challenges that are very real around how attributes of identity are measured, whether it's off of taxes or birth records and so forth. Can I hold? Because I want to just hit two other things. This Foundation, these are all the people in this Foundation doing all of this work. It's just a list that you can look at later. And they've set up-- and I apologize-- they set up sort of this whole idea about decentralized ID and server. So they have a whole program. It's not a small effort that they are investing in this. And I only put it up to say, there is a lot of energy. And Alin might be right, it's all fraught with some risk because it's on the backs of government ID systems, not just in the US. Public key infrastructure could change. And a lot of these concepts are on decentralized public key infrastructure. Basically, where are these public keys? Whether it's Facebook public key or any public key, where is it stored? I suspect, Alin, that you'd say this is at least going in a little better direction. This is a key part of just saying, instead of the public key and having these certificate authorities, to have a secure way to store the public keys in a decentralized, hashed, using hash functions and blockchain technology. And I think all of them have this in the middle of it somewhere. AUDIENCE: It's a consensus problem. You want to agree. Everybody needs to agree with Facebook's public keys otherwise we're in trouble. Because you might use my fake Facebook server. So it's really just a consensus problem. It's not about hashes, security. Forget about that. Everybody has to agree what Facebook public key is. And that's where the blockchain comes in. GARY GENSLER: Sorry. Shawn. AUDIENCE: I just wanted to answer Alin's question. I don't think that's a public policy problem. If you want to change the SSN system, you have to change the entire system of how the banks operate, how the insurance companies operate. And the cost, the social cost, is much greater than just changing the [INAUDIBLE] key itself. I think he's entirely coming from the point of view for the implementation of [INAUDIBLE] consideration of the hidden economic cost of such implementation. AUDIENCE: But there is the Patriot Act, which says banks have to send your SSN to the government, which basically means banks need to continue using SSNs. So in some sense, you're right. But also, government has to do something. GARY GENSLER: So let's move on. I don't think it's just here in the US. What's happened is the attributes of our identity, or our credentials of identity-- whether it's for tax systems, for banking systems-- in the last 30-odd years, as we've digitized, and also post 9/11 and terrorists, we started to use all of these things for anti-money laundering, know your customer. So the financial system, the tax system, and our identity systems have now all been kind of linked up, and not always with the best intent. I mean, maybe they were the good intentions. But with not with the best results. And it's part of why I thought, if we were going to cover blockchain technology in the financial sector, identification systems were really important as well. Because it's so linked up with banking and finance. And that wouldn't have been the case before the digital revolution and the internet and so forth. I think this is the last cover slide. But this is self-sovereign identity platforms. Basically right now, if we want to keep our identity, if we want to keep our identity and only give it up, a platform could create and enforce rules governing the workflow. This is a little thing called bitsonblocks.net. But pretty much most of the startups are using an architecture around this. This happens to be Bits on Block's view of it. But it's basically, I'm going to keep my attributes of identity. And I choose when I can give it up and when it's used, authorities, and issuers. So I think I have hopefully-- oh, yes. MIT. That's where I wanted to go. So what did you all think? You read the little article about your own-- you going to get in it? James, you going to get your blockchain blockchain diploma? AUDIENCE: Yep. [INAUDIBLE] I have some experience. I started trying to get hold of my diploma back in 2012 for a degree that I got in 2007. My university was declared independent from the University of London. There was a whole record messup. I'm trying to get a copy of my transcript. GARY GENSLER: And you can't get it? AUDIENCE: I had to go through many different people, say, oh, can I get it? And they'd say, oh, we have to contact the old university because we were part of them. GARY GENSLER: I'm going to shorten your-- so how many of you are going to get a blockchain backed diploma when you graduate MIT? All right. A quarter of you. And those that aren't, who didn't raise their hand? AUDIENCE: [INAUDIBLE] GARY GENSLER: Oh, you will. Wait a minute. I didn't see any hands go up over here. So you're not? I don't care really. AUDIENCE: [INAUDIBLE] GARY GENSLER: Oh, you did? I want somebody who didn't raise their hand. Why aren't you going to get it? AUDIENCE: For me, it's just pure lack of information about the process. How to get it, what I have to do. So I don't know yet if I will or not. GARY GENSLER: So you're just saying there is an information curve you have to learn about it. The people that raised their hands and said you'd get it, how many of you will also get a paper diploma? You want something for the wall or for the significant other or for the children or the parents. Right? Right? There's still something about that. I don't even know where my college diploma is, by the way. But you still want that piece of paper. Was there anybody who was only going to get a blockchain diploma? And any of you that go to a different university, do you wish your university had a blockchain diploma? Nobody's going to speak up. Maybe not. All right. So it's a novelty. It's MIT. We're innovative. We have it. I hope you all do come next Tuesday. It will be our last time together. I'm going to try to wrap up with some ground truth as to what I think the whole topic and this subject is. This was meant to be about the business of blockchain technology, getting through at least enough of the details, knowing those details, and then saying, well, how does that apply to the markets. Hopefully, you feel that you've gotten, and Tuesday we'll summarize it all, some critical reasoning skills that you can sort through the hype and the reality. And those of you that came in maximalist, you're probably more in the middle. Some of you that were minimalist maybe came-- well, maybe you're still, but you came a little-- because I thought that was the right place to teach. And you've all given me tremendous feedback. And I've learned a lot from you all. But let's keep it going. See you on Tuesday.
Info
Channel: MIT OpenCourseWare
Views: 61,684
Rating: undefined out of 5
Keywords: identity, access management, state projects, authentication, authorization, certificates
Id: W06Le8fw0vU
Channel Id: undefined
Length: 73min 49sec (4429 seconds)
Published: Thu Jan 23 2020
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.