First day of Nordsec 09 October 15, 2009Posted by tcarlyle in Biometrics, identity management, SIM Cards, trust, Uncategorized.
Tags: e-identity, e-voting, identity, identity management, nordsec, privacy, security, sim card
add a comment
I’m bloging directly from the Nordsec 09 conference here in Oslo. So far it has passed one day and a half and the programme has been quite interesting. There has been a more strong focus on identity and privacy, and, moreover more “high-level” presentations than the conference last year. As the conference programme has been quite extensive I must assume not having payed full attention to all presentations and specially the ones that didn’t have slides as supporting material. I’ll cover in this post just a bit of my impressions around the first day.
The first day was mainly about identity and privacy. We started with a great presentation from Drummond Reed from the Information Card Foundation. He end up spending some of time explaining IdM as the concept was not familiar for the whole public, then he talked a bit on the challenges to using the open ID standards by the governments, in special in the USA. He also mentioned the issue of having a branding competition on the websites towards the several OpenID providers. It was pretty interesting to see that the US government is going for an exisiting open IdM standard and also to know that apparently a lot of the companies that seemed to be competing for IdM ownership seem to be cooperating more. At least, as far as I got there are several new players joining the OpenID (although it is not clear if they are just offering authentication tokens or if they are also accepting other OpenID tokens) and the Information card has become a common format shared between Cardspace, Higgins and other selectors.
There was a presentation about Identity Theft from the Ministry of Justice and the Police of Norway. The presentation was mainly on how biometrics could help to prevent Identity Theft. As the usage of biometrics in his speech was not characterized if it was for identification or authentication as I mentioned in a post in the blog, it generated a lot of questions around the dangers of impersonating someone using a copy of the biometric template which could be gathered through a fingerprint left in a glass for example. This generated some discussion around storage of the biometric template and issues around biometrics in unsupervisioned scenario which the speech could have maybe addressed and made itself even more interesting.
Later we had a presentation of Tor-Hjalmar Johannessen from Telenor presenting arguments towards having an e-ID centric model on the SIM with very logical arguments. He bases it in the massive presence of sim cards, its security, the fact that they already represent an excellent working case of IdM (roaming is single-sign-on), new enhacements to the SIM as a hardware and software platform and others. I had already seen other of this presentations on the topic and I’ve read a few of his papers for my Master Thesis. Therefore, it was not something completly new for me, but it already introduced the audience in the topic which will be good for my presentation on Friday =)
Other 2 presentation that specially called my attention were the one about “Privacy risks in Web 2.0” from Roar Thon from the Norwegian National Security Authority and the one about the future e-voting system in Norway. The first one was a bit more on the need of creating awareness around how much private information we are publishing and distributing. It was interesting to see tha the Norwegian National Security Authority is interested in that and also on some numbers presented. In fact the presentation opened the point of the lack of attribution of social networks relations which is something Ill discuss in my presentation.
I think I’ve never stopped to think so much about the complexities around e-voting and the presentation from Christian Bull gave a great overview. There are issues on the fact that you are not over a supervisioned environment and this could lead to vote selling or coertion, or on making sure that every vote is counted but it is not possible to trace who voted in who, and there it goes. He presented a few neat features to counter some difficulties of the e-voting and the system sounds very promissing. It was also nice to see that they plan to make it open source so the system security can be assessed and they will submit it to common criteria evaluation (or a similar one, I dont quite remember).
I’m not sure if the presentations are going to be published in the conference website, but in case it will I write it here.