Zero-Knowledge Proof

For discussions about security.
Post Reply
Message
Author
labbe5
Posts: 2159
Joined: Wed 13 Nov 2013, 14:26
Location: Canada

Zero-Knowledge Proof

#1 Post by labbe5 »

https://bravenewcoin.com/insights/zero- ... a-security

Identity verification poses a challenge to businesses. Confirming that customers are who they say they are by implementing 'Know Your Customer' ( KYC) processes is an accepted way to serve customers, limit fraud and comply with anti-money laundering regulations. At the same time, collecting personally identifiable information creates new headaches as data privacy regimes such as GDPR and CDPR come into force. Moreover, rich sets of personal data are targets for hackers and increase business risk.

The solution to these challenges may require a counterintuitive approach: stop collecting information altogether. Significantly, both Privacy-by-Design and the GDPR are driving data minimalization. Blockchain-based digital identity systems that apply a technique called zero-knowledge proof let businesses verify information about a customer without ever receiving that information. With zero-knowledge proof, businesses can minimize the collection of personal data and reduce both the burden and the risks that holding personal data creates.


Further reading :
The problem with Facebook’s sorry campaign
https://venturebeat.com/2018/09/29/sorr ... -campaign/
Alternatives to Google Products – the Complete List
https://restoreprivacy.com/google-alternatives/
Last edited by labbe5 on Tue 27 Nov 2018, 00:04, edited 2 times in total.

musher0
Posts: 14629
Joined: Mon 05 Jan 2009, 00:54
Location: Gatineau (Qc), Canada

#2 Post by musher0 »

But seriously...

What's wrong with the old standards?

-- phone check: On initial contact, by e-mail or otherwise, the seller and
the customer could agree on a certain word, say a color. On second
contact, this time by phone, the seller asks: "What's the color?"

-- mail check: paypal does it. They send a password to your physical
address, that you must then enter on-line, within a time frame, to confirm
your new account.

-- buying the merchandise in person, in a store? I mean... actual
shopping?! It forces you to get off your cushion and do some exercise,
as well as dusting off your civility skills, talking / negotiating with the
merchant or his employee.

BFN.
musher0
~~~~~~~~~~
"You want it darker? We kill the flame." (L. Cohen)

User avatar
Flash
Official Dog Handler
Posts: 13071
Joined: Wed 04 May 2005, 16:04
Location: Arizona USA

#3 Post by Flash »

How does Zero-Knowledge Proof work?
To continue our analogy, let's assume the vineyard is already connected to an identity system that verifies personal information...
The whole scheme depends on a trusted and uncrackable source of personal information. Count me out.

User avatar
nosystemdthanks
Posts: 703
Joined: Thu 03 May 2018, 16:13
Contact:

#4 Post by nosystemdthanks »

Flash wrote:The whole scheme depends on a trusted and uncrackable source of personal information.
does it? im not sure a particular implementation will work, but the idea itself doesnt sound like that at all. outside of the particular example, it sounds more like an extra layer of abstraction, similar to something like:

1. a master account number + password pair

2. which can be abstracted via cryptographic process (blockchain) to additional account numbers + password pairs

3. which can probably be traced back to 1 (in terms of privacy) because blockchains arent as anonymous as people think-- but--

4. if at least 1 is anonymous, then so are 2 and 3 within a certain scope, until a transaction strips that.

i have no proof of this, i might be way off. this is how i am reading it. i am curious how certain you are that this gives you less control of information / security than say-- your name and credit card number and pin.

im neither a fan or a sceptic, and i dont think of blockchain technology as anonymous, since it often isnt. but having less of your personal information exposed is the entire point of this concept-- and youre saying it doesnt do that.
[color=green]The freedom to NOT run the software, to be free to avoid vendor lock-in through appropriate modularization/encapsulation and minimized dependencies; meaning any free software can be replaced with a user’s preferred alternatives.[/color]

nour

Re: Zero-Knowledge Proof

#5 Post by nour »

labbe5 wrote:https://bravenewcoin.com/insights/zero- ... a-security

Identity verification poses a challenge to businesses. Confirming that customers are who they say they are by implementing 'Know Your Customer' ( KYC) processes is an accepted way to serve customers, limit fraud and comply with anti-money laundering regulations. At the same time, collecting personally identifiable information creates new headaches as data privacy regimes such as GDPR and CDPR come into force. Moreover, rich sets of personal data are targets for hackers and increase business risk.

The solution to these challenges may require a counterintuitive approach: stop collecting information altogether. Significantly, both Privacy-by-Design and the GDPR are driving data minimalization. Blockchain-based digital identity systems that apply a technique called zero-knowledge proof let businesses verify information about a customer without ever receiving that information. With zero-knowledge proof, businesses can minimize the collection of personal data and reduce both the burden and the risks that holding personal data creates.


Further reading :
The problem with Facebook’s sorry campaign
https://venturebeat.com/2018/09/29/sorr ... -campaign/
Alternatives to Google Products – the Complete List
https://restoreprivacy.com/google-alternatives/
The server will exchange data with the clients so there will be always breaches.
And societies who collect data aren't doing it for authentication reasons but to sell personal data so a new validation approach is not the real solution here.

User avatar
rufwoof
Posts: 3690
Joined: Mon 24 Feb 2014, 17:47

#6 Post by rufwoof »

I'm with Virgin for ISP. One thing that really P's me off is when the call me and then say for security reasons would I confirm x, y, z. To which I always reply ... you called me, so you verify what x,y,z might be so that I know you are who you say you are. Always leads to the same end, a waste of both of our times as their "systems don't work that way".
[size=75]( ͡° ͜ʖ ͡°) :wq[/size]
[url=http://murga-linux.com/puppy/viewtopic.php?p=1028256#1028256][size=75]Fatdog multi-session usb[/url][/size]
[size=75][url=https://hashbang.sh]echo url|sed -e 's/^/(c/' -e 's/$/ hashbang.sh)/'|sh[/url][/size]

User avatar
bigpup
Posts: 13886
Joined: Sun 11 Oct 2009, 18:15
Location: S.C. USA

#7 Post by bigpup »

That is like your bank calling you and they cannot tell you the account number.
Virgin ISP, their "systems don't work that way".
How do they know what to put on the bill you get for service :!: :roll: and know your phone number to call :roll:

I would say those calls are fake and someone trying to get info from you! :shock:

I have never gotten that kind of call from anyone that provides service to me.
A real call, just starts talking about, whatever they are calling about.
The things they do not tell you, are usually the clue to solving the problem.
When I was a kid I wanted to be older.... This is not what I expected :shock:
YaPI(any iso installer)

User avatar
greengeek
Posts: 5789
Joined: Tue 20 Jul 2010, 09:34
Location: Republic of Novo Zelande

#8 Post by greengeek »

nosystemdthanks wrote:
Flash wrote:The whole scheme depends on a trusted and uncrackable source of personal information. Count me out
does it? ....

i have no proof of this, i might be way off. this is how i am reading it. i am curious how certain you are that this gives you less control of information / security than say-- your name and credit card number and pin.
I could be wrong but I think Flash was suggesting that if the system depended on accumulating a database of personal information that was pretending to be "uncrackable" then he didn't feel it was that trustworthy.

I agree. I would prefer to trust my own choice of password (prefereably 2FA) and handle my own authentication than let a distant party accumulate personal identifiers and tell me when I am authorised to their satisfaction.

(Apologies to Flash If i have misunderstood his comment)

User avatar
Burn_IT
Posts: 3650
Joined: Sat 12 Aug 2006, 19:25
Location: Tamworth UK

#9 Post by Burn_IT »

The whole point of site security is that only you and the site concerned know the access key.
Giving the key to someone else to look after immediately destroys that security.

Would you give your neighbour your wallet to look after and maintain??
"Just think of it as leaving early to avoid the rush" - T Pratchett

User avatar
Flash
Official Dog Handler
Posts: 13071
Joined: Wed 04 May 2005, 16:04
Location: Arizona USA

#10 Post by Flash »

greengeek wrote:(Apologies to Flash If i have misunderstood his comment)
No apology necessary, you got it exactly right.

Post Reply