TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Auth0 Verifiable Credentials

229 点作者 marcosnils超过 2 年前

25 条评论

vintermann超过 2 年前
Like anything OAuth2-related, it&#x27;s frustratingly vague and jargony.<p>Verifiable credentials is a terrible name. We have had verifiable cryptographic credentials for more than 40 years.<p>What I want, is a practical protocol to prove to a third party<p>1. That I am a real person (e.g, has a unique credential issued by my government)<p>2. That I&#x27;m the only one currently &quot;logged in&quot; with them, with that credential.<p>3. Without the third party, (and with as few parties as mathematically possible) knowing <i>which</i> of the people with a credential issued by my government I am.<p>In short, to prove that I&#x27;m a real person, that I&#x27;m not running an army of sockpuppets, and yet preserve my privacy.
评论 #33433907 未加载
评论 #33501669 未加载
robbie-c超过 2 年前
Tangentially, if you’re a B2C startup like an app, avoid using auth0. Their pricing starts out cheap but once you hit 10k MAU, it’ll go from $X00 a month to a 3 year contract for $X00000.<p>It’s not designed as a business for that use case, and you’ll be paying for a lot of premium features that you’ll never use.<p>If something like Firebase Auth suits your use case, use that instead.
评论 #33433507 未加载
评论 #33433625 未加载
评论 #33434657 未加载
评论 #33434060 未加载
CleverLikeAnOx超过 2 年前
This places all the trust in the institution that mints verifiable credentials. (or the institution + Auth0 if they use Auth0).<p>This is good for use cases where you want to assert that an organization says something about you (e.g., you have a degree).<p>It is not good for use cases where you want to assert that you say something (e.g., I voted for Blah, or I authorized this transfer).
评论 #33428830 未加载
评论 #33428472 未加载
评论 #33427934 未加载
评论 #33431851 未加载
评论 #33434309 未加载
评论 #33430481 未加载
cassonmars超过 2 年前
I love that verifiable credentials are starting to make mainstream, but one thing I couldn’t glean from this page: is this purely VC from a perspective of “here’s the attributes I care to see”, or “here’s the characteristics I care to see”? To clarify: say I’m an alcohol vendor and wish to confirm that a user is 21 or older. Does the VC issuance provide a range proof that does not reveal the age, or does the VC issuance explicitly reveal the age?
评论 #33429095 未加载
评论 #33433126 未加载
paxys超过 2 年前
The only thing the web identity ecosystem needs is another independent standard – said no one ever.<p>JWT is already a thing, as is X.509, OAuth&#x2F;OpenID, WebAuthn... Just use a combination of these that best fits your use case.<p>&quot;But this new standard will be the true unifying one&quot;. Nope, it will not. The most it will do is get some share of usage and add to the chaos.
评论 #33429669 未加载
评论 #33428527 未加载
评论 #33432480 未加载
评论 #33432509 未加载
评论 #33429908 未加载
评论 #33428490 未加载
Aeolun超过 2 年前
Isn’t this just Json Web Tokens with a different name? (and an extra step to create a VP, presumably so the expiry on the VC can be longer).
评论 #33428448 未加载
评论 #33428466 未加载
评论 #33428495 未加载
woodruffw超过 2 年前
I wonder what the benefits of this versus e.g. OpenID Connect[1] are: OIDC is already semi-widely adopted, reuses a popular underlying envelope scheme (JWTs), and performs a similar type of proof (that some identity provider claims something about an identity).<p>[1]: <a href="https:&#x2F;&#x2F;openid.net&#x2F;connect&#x2F;" rel="nofollow">https:&#x2F;&#x2F;openid.net&#x2F;connect&#x2F;</a>
评论 #33428610 未加载
评论 #33429630 未加载
评论 #33431684 未加载
OJFord超过 2 年前
Call me a cynic but all this proves is that someone vouched for the stated credential being associated with a key I currently hold?<p>i.e. you have to check imperial.ac.uk&#x2F;.well-known&#x2F;auth0-vc.pub or whatever, and if that matches, still all you know is that I have the key (or device, whatever), not necessarily that it was truly me. And if you don&#x27;t check the issuer (or don&#x27;t trust it&#x27;s claim - impeerial.ac.uk says that the bearer has a degree from imperial.ac.uk for example) then it doesn&#x27;t tell you anything.<p>Of course that&#x27;s not really avoidable... but I can&#x27;t think of a use case for this that doesn&#x27;t just reduce to &#x27;the issuer may as well just publish the contents&#x27; - it&#x27;s useful when you want to only selectively share a credential from party A with party B, <i>and</i> it&#x27;s something that B has reason to doubt&#x2F;verify... but I can&#x27;t think of an example?
评论 #33434469 未加载
dudebod超过 2 年前
Im interested to know why opt for basic asymmetric cryptography (is this like a ECDSA scheme?) when there are so many advances in zero knowledge proofs to allow for queryable data?
评论 #33431798 未加载
评论 #33430292 未加载
siliconc0w超过 2 年前
It&#x27;d be nice if you could just assert facts on a verifiable credential without giving over all the information, like I want to request from my bank that they assert I have regular income &gt; $x&#x2F;mo or a savings account with at least $y. Not like financial institutions will actually adopt this unless they&#x27;re forced to by regulation but I basically want to give people exactly enough to provide the service requested and no more.
评论 #33435679 未加载
评论 #33430633 未加载
6510超过 2 年前
I imagined one time a system a bit like a chat protocol where parties exchange many messages over a long time where the geolocation, the computer and the application are parties too. The parties each have many different kinds of credentials, one for each purpose. It would start with requesting verification for the application, it can ask step&#x2F;level 1 from any party, device or application with sufficient authentication for level 1 verification of applications. (The fridge can reject the task if it doesn&#x27;t feel like participating.) Level 2 is done after a few hours at a party that can do level 2 verification. The toaster like the fridge may forward the request to a different party with sufficient trust level to record, process and forward the auth request (if it feels like it) The initial party is kept in the dark on how wide spread their app auth request has been processed. Processing auth requests that enjoyed some further validation also gradually improves the trust level of the processing party. Countless handshakes take place over many years with countless other parties of increasing trust that may or may not preserve the exchange and&#x2F;or geolocation. Eventually the sum of the computer, app and user credentials allows the generation of a qr code or a link that expires after 5 min or single use, which ever comes first but it will grow towards 7 days and 100 uses at security level 1. So the local pub has some potentially off-line semi-usable hand shakes from a machine&#x2F;app&#x2F;user combination and it previously validated a few of them including an &quot;over 21&quot; with a car in the neighborhood and a vending machine. Those can confirm the toaster indeed forwarded an auth request to them. Neither party needs internet, everything just works. Persecution may start long before you get to buy booze or rent a bicycle or it will catch up with you eventually. Post apocalyptic&#x2F;countryside offline mode may be taken away from you.
NovemberWhiskey超过 2 年前
Pretty sure this is the same technology as used for e.g. IBM Digital Health Pass, which underlies things like NY&#x27;s Excelsior Covid pass.
throwaway892238超过 2 年前
As a &quot;we authenticate everything&quot; company, it&#x27;s important for Auth0 to make it deadass simple for somebody to pay Auth0 (or Okta) to manage VCs. I think the idea is some company like CLEAR provides the authentication, and Auth0&#x2F;Okta provides the authorization. You go to buy a beer or check into a hotel, Auth0 contacts your Issuer for verification of your CredentialType, validates the credential, returns to the vendor that you&#x27;re really you, and you get the thing you want.<p>It&#x27;s a nice idea. But their &quot;Try it out!&quot; link (<a href="https:&#x2F;&#x2F;manage.auth0lab.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;manage.auth0lab.com&#x2F;</a>) just returns &quot;Error code: SSL_ERROR_RX_RECORD_TOO_LONG&quot; for me (is it just me?)
leovander超过 2 年前
Looking at the credentialSubject and the rest of the format all I see is our friend SAML coming back to the limelight. Assertions, issuer, type, along with let&#x27;s overload all those optional fields inside of credentialSubject instead of making separate entities or objects.
adontz超过 2 年前
I did not understand if this is somehow related to <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Self-sovereign_identity" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Self-sovereign_identity</a> or not.
评论 #33430652 未加载
justsomeadvice0超过 2 年前
What is the point here? Wikipedia tells me:<p>&gt; No proof mechanism is standardized but the data model is flexible enough to support various existing cryptographic mechanisms, such as digital signatures.<p>So why even have a standard at all? It is impossible to verify the proof using this standard, which is the main point of verifiable credentials, no?<p>The cryptographer in me&#x27;s eye is twitching, as I consider all the completely different cryptosystems that will get shoved into &quot;proof&quot; that one would have to support, none of which seem to be spec&#x27;d out.<p>I guess I just don&#x27;t get it. What does this actually help with?
jameshart超过 2 年前
Can&#x27;t immediately grasp how this avoids a MITM attack at the &#x27;verifiable presentation&#x27; stage. Am I missing something?
评论 #33429451 未加载
pfraze超过 2 年前
VCs are typically used in conjunction with DIDs. Do they say anywhere whether they’re using DIDs and, if so, which methods?
评论 #33431730 未加载
tristor超过 2 年前
How is this fundamentally different than something like KeyBase other than the aspect of centralizing issuance control into the hands of large entities?
thesimon超过 2 年前
Wanted to take a look at the schemas linked, but identity0.io isn&#x27;t even registered? oO
评论 #33428305 未加载
etchalon超过 2 年前
And not a blockchain in site.
ccbccccbbcccbb超过 2 年前
Next step: &quot;Unfortunately, Chrome can&#x27;t connect to the Internet right now. We at Google strive for a healthier, more responsible society. Please fill your vaccination details in the form below.&quot;<p>For everyone feeling the kneejerk urge to downvote: <a href="https:&#x2F;&#x2F;www.bbc.com&#x2F;news&#x2F;world-asia-63456107" rel="nofollow">https:&#x2F;&#x2F;www.bbc.com&#x2F;news&#x2F;world-asia-63456107</a>
egorfine超过 2 年前
Is this another KYC?
vladcodes超过 2 年前
I would (and will) avoid anything like this by any cost.<p>Rests. Survive.
transfire超过 2 年前
Ugh. The use cases listed. Sounds like a perfect match for the Chinese government.