Agree opposed to OIDF running this, might even be opposed to OIX as I'm not 
sure it with the scope of the charter

-----Original Message-----
From: [email protected] 
[mailto:[email protected]] On Behalf Of Dick Hardt
Sent: Tuesday, June 08, 2010 1:59 PM
To: David Recordon
Cc: [email protected]
Subject: Re: XAuth critiques

I am opposed to the OIDF running it. Might make sense for OIX, but I am not 
involved in that organization.

On 2010-06-08, at 11:31 AM, David Recordon wrote:

> I am opposed given that it's unclear how the operational costs would 
> be covered and there is increased liability since whomever runs the 
> domain could do something malicious with the data. At least the OpenID 
> Foundation isn't setup to provide this sort of infrastructure today.
> 
> --David
> 
> 
> On Tue, Jun 8, 2010 at 11:29 AM, Brian Kissel <[email protected]> wrote:
>> Are folks opposed to the OIDF or OIX running the domain?  Don has 
>> suggested that in the past.  If not them, any other suggestions?
>> 
>> Cheers,
>> 
>> Brian
>> ___________
>> 
>> Brian Kissel
>> CEO - JanRain, Inc.
>> [email protected]
>> Mobile: 503.342.2668 | Fax: 503.296.5502
>> 519 SW 3rd Ave. Suite 600  Portland, OR 97204
>> 
>> Increase registrations, engage users, and grow your brand with RPX.  
>> Learn more at www.rpxnow.com
>> 
>> 
>> -----Original Message-----
>> From: [email protected]
>> [mailto:[email protected]] On Behalf Of Allen Tom
>> Sent: Tuesday, June 08, 2010 11:24 AM
>> To: Eran Hammer-Lahav; John Panzer
>> Cc: [email protected]
>> Subject: Re: XAuth critiques
>> 
>> I think that nearly everyone agrees that many of the UX, privacy, and 
>> security issues that we have today with internet identity could 
>> potentially be solved using new identity features baked into 
>> browsers.
>> 
>> However, while we wait for users to have browsers that support these 
>> features, is there something that we can deploy today? Xauth could be 
>> an interim solution until we do have support in the browser. It is 
>> conceivable that browsers could reuse the same Xauth JS interface.
>> 
>> Again - I don't see why we can't work on both server based and 
>> browser based solutions in parallel.
>> 
>> Regarding the privacy issues of having a centralized domain - the 
>> overwhelming majority of sites already deploy centralized JS that 
>> already correlates users across domains - so in this respect, Xauth 
>> is really nothing new. Ad networks, website analytics, and "Like" 
>> buttons are just a few examples.
>> 
>> As far as I know, all of the serious proposals for using Xauth is 
>> just to store the user's OP preference - a simple boolean flag that 
>> indicates that the user behind the browser happens to be concurrently 
>> logged into a particular IdP. This is already "public" information 
>> that some IdPs already support - for instance both Facebook and 
>> Google already support this
>> today:
>> 
>> Facebook Connect Status:
>> http://wiki.developers.facebook.com/index.php/Detecting_Connect_Statu
>> s
>> 
>> Google's openid.ui.mode=x-has-session:
>> http://code.google.com/apis/accounts/docs/OpenID.html#Parameters
>> 
>> The only new thing in Xauth is that RPs can just query a single API 
>> (potentially loaded entirely from the browser's cache) to check all 
>> IdPs where the user could be logged into. This is information that 
>> RPs can already get by directly querying each IdP. The only 
>> difference is that Xauth can reduce the network overhead of checking 
>> the login status.
>> 
>> It is true that there are serious challenges with having a 
>> centralized domain - who runs this domain? How is it governed? Where does 
>> the data go?
>> These are real issues - however they're not really technical issues, 
>> and I think they can be solved, if a "trusted third party" can run 
>> it. I still have yet to see a serious proposal to actually run this 
>> domain though - so perhaps this is not realistic.
>> 
>> 
>> Allen
>> 
>> 
>> 
>> On 6/7/10 10:17 PM, "Eran Hammer-Lahav" <[email protected]> wrote:
>> 
>>> 
>>> If Google, Yahoo, Microsoft, and the rest of the companies 
>>> supporting
>> the
>>> OpenID effort deployed the server-side half of this proposal, and 
>>> spent
>> a
>>> little money on developing plug-ins for all the major browsers (with
>> Google
>>> and Microsoft able to also include it in the next release of their
>> browser),
>>> it will create the tipping point in getting some form of identity
>> selector in
>>> the browser.
>> 
>> _______________________________________________
>> specs mailing list
>> [email protected]
>> http://lists.openid.net/mailman/listinfo/openid-specs
>> _______________________________________________
>> specs mailing list
>> [email protected]
>> http://lists.openid.net/mailman/listinfo/openid-specs
>> 
> _______________________________________________
> specs mailing list
> [email protected]
> http://lists.openid.net/mailman/listinfo/openid-specs

_______________________________________________
specs mailing list
[email protected]
http://lists.openid.net/mailman/listinfo/openid-specs

_______________________________________________
specs mailing list
[email protected]
http://lists.openid.net/mailman/listinfo/openid-specs

Reply via email to