Threat Modeling for Decentralized Identities @ W3C

September 6th, 2024

Simone Onofri
W3C Security Lead
WeChat: wxid_3hq0pclnrhr512
Email: simone@w3.org

Who am I?

World Wide Web Consortium 万维网联盟

W3C composition

What is Threat Modeling?

Why Threat Modeling for Digital Credentials?

How are we doing Threat Modeling?

We are using the "Four Questions Frame":

What are we working on?
Architecture

We started from the Verifiable Credentials Data Model (VCDM) to identify main Actors, Data Flows, and Data to protect.

The actors and data flows of VCDM

What are we working on?
Actors and Data Flows

What are we working on?
Exchanged Data

From a Threat Modeling perspective: we have cryptography, formats, serialization, canonicalization, identifiers, revocation methods, etc...

What are we working on?
Identifiers

From a Threat Modeling perspective: each DID method needs it is own Threat Model (e.g., did:web may calls home, did:btcr may have correlation)

What can go wrong?
Mnemonic Threat Lists

One effective though inefficient approach to threat modeling is to cycle the various lists to understand how they may affect the model

Note: Repudiation is a Security Threat, and its negation Non-Repudiation, is a Privacy Threat.

What can go wrong?
Other lists

Note: In OSSTMM, Security and Privacy are together, and anyway there are some overlaps.

What can go wrong?
Using LINDDUN

Brainstorming, using gamification, in a Side Meeting @ IETF120

What are we going to do about it?
Mitigations

Feedback on the EU Digital Identity's ARF 1.4.0: Our specific recommendation is to use the BBS [...], and countering future quantum threats, and we probably need new chips.

Did we do a good job?

All models are wrong, but some are useful from statistician George Box (1976), quoted by Shostack (2014)

谢谢

See also:

These slides:
https://w3.org/2024/Talks/inclusion-simone/

Email: simone@w3.org

WeChat: wxid_3hq0pclnrhr512