Skip to content
This repository was archived by the owner on Oct 11, 2024. It is now read-only.

Use cases#1489

Merged
gdbelvin merged 4 commits intogoogle:masterfrom
gdbelvin:scenarios
Mar 6, 2020
Merged

Use cases#1489
gdbelvin merged 4 commits intogoogle:masterfrom
gdbelvin:scenarios

Conversation

@gdbelvin
Copy link
Contributor

@gdbelvin gdbelvin commented Mar 5, 2020

No description provided.

@gdbelvin gdbelvin requested a review from a team as a code owner March 5, 2020 14:57
@gdbelvin gdbelvin requested a review from pav-kv March 5, 2020 14:57
@gdbelvin gdbelvin requested a review from rmhrisk March 5, 2020 14:57
@codecov
Copy link

codecov bot commented Mar 5, 2020

Codecov Report

Merging #1489 into master will increase coverage by 0.22%.
The diff coverage is n/a.

Impacted file tree graph

@@            Coverage Diff             @@
##           master    #1489      +/-   ##
==========================================
+ Coverage   67.93%   68.15%   +0.22%     
==========================================
  Files          54       54              
  Lines        4026     4026              
==========================================
+ Hits         2735     2744       +9     
+ Misses        891      882       -9     
  Partials      400      400              
Impacted Files Coverage Δ
core/sequencer/election/tracker.go 80.45% <0.00%> (+10.34%) ⬆️

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update 2747f89...50608d9. Read the comment docs.

Copy link
Contributor

@pav-kv pav-kv left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM % nits.

Key Transparency ensures, with mathematical certainty, that account owners can
see all the public keys that have been associated with their account.

This zero-trust architecture is useful in a variety of scenarios from end-to-end encryption to enterprise account management.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is it zero trust, or something a bit weaker? Some sort of "trust but verify" thing?
Just want to make sure we don't promise too much here.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good point. How's "assured system design"?



Key Transparency ensures, with mathematical certainty, that account owners can
see all the public keys that have been associated with their account.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Would it be worth elaborating a bit on what "associated" means? Like, some other user using my key is included here, right?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

How's "see all the public keys that have been used to authenticate their account or send them messages." ?

|---------------|------------------|
| Encrypted Messaging | Key Transparency is ideal for user friendly end-to-end encrypted messaging. By making key management analogous to device management, users do not have to learn any new concepts, and no additional UI beyond device management is needed. Key management fits seamlessly into existing account life-cycle flows, and users are protected without requiring them to take additional actions. |
| PGP Encrypted Email | Key Transparency was initially built to solve the problem of public key lookup for PGP email encryption. KT has the potential to make PGP significantly more usable than the existing web-of-trust model. |
| Insider Risk | Key Transparency removes the possibility that a system administrator, whether accidentally, on purpose, or via a hack, might add or remove public keys (eg. [U2F Security Keys](https://en.wikipedia.org/wiki/Universal_2nd_Factor)) from a user account without detection. This enables new levels of security in authentication systems. |
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
| Insider Risk | Key Transparency removes the possibility that a system administrator, whether accidentally, on purpose, or via a hack, might add or remove public keys (eg. [U2F Security Keys](https://en.wikipedia.org/wiki/Universal_2nd_Factor)) from a user account without detection. This enables new levels of security in authentication systems. |
| Insider Risk | Key Transparency removes the possibility that a system administrator, whether accidentally, on purpose, or via a hack, adds or removes public keys (eg. [U2F Security Keys](https://en.wikipedia.org/wiki/Universal_2nd_Factor)) from a user account without detection. This enables new levels of security in authentication systems. |

@gdbelvin gdbelvin merged commit c6ef70f into google:master Mar 6, 2020
@gdbelvin gdbelvin deleted the scenarios branch March 6, 2020 11:41
gdbelvin added a commit to gdbelvin/keytransparency that referenced this pull request Mar 25, 2020
* master: (109 commits)
  Upgrade Prometheus (google#1500)
  Run `go build ./...` with github action (google#1446)
  Replace tinkio.ProtoFile with keyset.BinaryReader (google#1492)
  Bump github.com/golang/mock from 1.4.1 to 1.4.2
  Bump github.com/prometheus/client_golang from 1.5.0 to 1.5.1
  Bump github.com/golang/protobuf from 1.3.3 to 1.3.5
  Bump github.com/google/tink from 1.3.0-rc4 to 1.3.0
  New Design Doc (google#1469)
  Acknowledgements (google#1490)
  Use cases (google#1489)
  Bump github.com/prometheus/client_golang from 1.4.1 to 1.5.0 (google#1486)
  README.md # Related (google#1485)
  Explain authorized keys (google#1484)
  Use new prometheus sidecar deployment (google#1483)
  don't overwrite the ReplicaSet service label (google#1482)
  Update encrypted creds (google#1481)
  Pickup DB_HOST env variable (google#1480)
  Fix credential encryption (google#1479)
  Use Cloud MySQL in GKE (google#1473)
  Update client_secrets.json.enc (google#1478)
  ...
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants

Comments