Their Capers’ Public Fields

I always say that one thing I learned from writing books is that no matter how you write something, somebody will find a different way to interpret it. Spire Security Viewpoint read my Their Capers’ Social Fields as a plea to keep social security numbers more confidential. I wrote it using social security numbers as an example of how any widely used identity key won’t ever be kept confidential, so using such a common key is a bad idea.

Anyway, SSV has an interesting comment:

We need to turn this argument on its head and make all SSNs public record. Then, we can work towards a real solution that can protect the individual.
Yes, good idea. If SSNs were public, it would be so obvious that they’re horrible keys to use for security that maybe organizations would stop doing so.

-jsq

3 thoughts on “Their Capers’ Public Fields

  1. wpn

    So, what’s a better key? Seriously, a lot of people will need to know. Say that you need to authenticate someone who’s registering at your site for the first time. Or say that you have to look up a person in someone else’s database of a million-plus people, and you may or may not know how to spell their name correctly or know where they live (Bob Smith, Robert Smith, Rob Smith, R Smith — and people move around a lot). You shouldn’t see anyone else’s records but be able to specify one and only one individual. How’re you gonna do it?
    Too many entities need a unique identifier for every single citizen. If it’s not the SSN, and we simply issue a “citizen ID card” with a different number, you know that’s the one they’re going to use next for authentication. What’s the solution?

  2. Pete

    @JSQ –
    Sorry for the misinterpretation. Not sure if I just read it differently or had a predisposition on what you would write.
    @WPN –
    The SSN is useful as an identifier for U.S. Citizens simply because it is used everywhere. But it is an awful authenticator. So the key is to bind that SSN identifier to a true authenticator. I favor public/private keys in certificates, but it doesn’t really matter what you use. Of course, this means that the trusted third party is critical lest spoofing remain commonplace.

  3. John Quarterman

    Pete,
    No problem. My experience with books is that different people will come up with different interpretations, some of them refreshingly novel.
    One difference between a book and a blog at least in my case is that with a book I go out of my way to imagine readings other than what I intended and to reword and to write redundantly until it seems fairly obvious what I’m getting at and hard to misinterpret. With a blog, I usually go for one way of writing it and count on readers to comment back with how they read it; this seems to result in interesting conversations.
    -jsq

Comments are closed.