Internet DRAFT - draft-hallambaker-iab-aggregation
draft-hallambaker-iab-aggregation
Network Working Group P. Hallam-Baker
Internet-Draft May 12, 2019
Intended status: Informational
Expires: November 13, 2019
Business Models for Content Aggregation
draft-hallambaker-iab-aggregation-00
Abstract
This document is also available online at
http://mathmesh.com/Documents/draft-hallambaker-iab-aggregation.html
[1] .
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on November 13, 2019.
Copyright Notice
Copyright (c) 2019 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Hallam-Baker Expires November 13, 2019 [Page 1]
Internet-Draft PHB Aggregation May 2019
Table of Contents
1. Where the Web failed . . . . . . . . . . . . . . . . . . . . 2
1.1. How users pay for content . . . . . . . . . . . . . . . . 2
1.2. Concentration and its Consequences . . . . . . . . . . . 3
1.3. User experience . . . . . . . . . . . . . . . . . . . . . 4
1.4. The wider context . . . . . . . . . . . . . . . . . . . . 5
2. The Technology Gap . . . . . . . . . . . . . . . . . . . . . 5
2.1. Content Interaction . . . . . . . . . . . . . . . . . . . 6
2.2. Payments . . . . . . . . . . . . . . . . . . . . . . . . 7
3. Mathematical Mesh . . . . . . . . . . . . . . . . . . . . . . 7
3.1. Management of private keys across devices . . . . . . . . 9
3.2. Dare Container . . . . . . . . . . . . . . . . . . . . . 9
3.3. Creator-to-consumer end-to-end Web security. . . . . . . 10
3.4. Deployment strategy . . . . . . . . . . . . . . . . . . . 10
3.5. Shared Bookmarks . . . . . . . . . . . . . . . . . . . . 11
4. References . . . . . . . . . . . . . . . . . . . . . . . . . 12
4.1. Informative References . . . . . . . . . . . . . . . . . 12
4.2. URIs . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 12
1. Where the Web failed
Many if not most technologies that came to define the era in which
they were created owe a large part of their success to the failed
expectations of the technologies that immediately preceded them. The
telegraph and canals demonstrated the potential, but radio and the
railways defined their age. The World Wide Web was fortunate to
arrive at the exact moment that home trials of Interactive TV had
shown it to be an expensive flop.
Apart from the name, the only part of Interactive TV that was
'interactive' was the ability to buy branded merchandise associated
with a program. Interactive TV did little more than add a 'purchase'
button to the remote control. The Web in contrast offered much more
because any user of the Web could become a content provider.
It is with no little irony therefore that thirty years later, the Web
has largely become the thing it was meant to destroy and a large part
of the reason we have come to this point is the lack of a 'purchase'
button on the remote control.
1.1. How users pay for content
Producing high quality content is an expensive business. The
question therefore is not whether users will pay for content but
rather how they will pay for content. They can pay directly, they
Hallam-Baker Expires November 13, 2019 [Page 2]
Internet-Draft PHB Aggregation May 2019
can pay by giving their attention, they can pay by giving up
information they own but they will pay one way or another.
At the time the Web was begun, the dominant business model for
television was paid advertising and so it was perhaps natural that
the early evolution of the Web followed this model. This choice was
not for want of consideration of other choices, proposals for Web
micropayments were made as early as 1993 and presented in technical
form in 1995. But advertising was the model understood by the
established content providers and so advertising was the business
model that they assumed they would eventually turn to when it finally
came time to monetize the audiences they were developing. The HTTP
referer field was originally introduced as a means of supporting
advertising through a performance-based model before the addition of
client-state (cookies) to the protocol.
In the event of course, the Web cannibalized classified advertising
and many of the other revenue streams that established content
providers had built their business on. By the time the need to
monetize was understood it was too late to develop new protocols or
infrastructures to support new business models. Having trained Web
users to expect that content is free, many content providers turned
to increasingly aggressive advertising presentations. Even today it
is not unusual to find Web site designs that leave the user trying to
read articles a few sentences at a time on a screen where 90% of the
pixels are occupied by advertising.
The crucial flaw that the content providers did not anticipate is
that content discovery is a vastly more attractive platform for
advertisers than content provision. Web search engine providers
offer a predictable, verifiable return on an advertising investment
that can be tightly focused to specific audiences. Few content
providers can compete and even those that can are at a disadvantage
because click-fraud and other scams are rife in the content provider
advertising market.
1.2. Concentration and its Consequences
According to the Interactive Advertising Bureau, online advertising
saw a 22% year on year growth in 2018 [iab-avertising-2019] . As in
previous years, the headline numbers show great potential, but the
details show a market that is dysfunctional and ultimately
unsustainable. Ten companies account for three quarters of all the
advertising revenues in 2018 and desktop revenues are actually
declining. Examination of the earnings reports of Facebook and
Google over the same period indicate that the concentration is even
more pronounced, and that content discovery is responsible for the
Hallam-Baker Expires November 13, 2019 [Page 3]
Internet-Draft PHB Aggregation May 2019
majority of advertising revenues and this portion is rising while
revenues for content providers are flat or falling.
While the current situation is certainly good for the dominant
content discovery services in short term, it is clearly
unsustainable. Content discovery is worthless unless there is
content to be discovered.
Whether this dysfunction in the market is ultimately resolved through
regulatory action, technical changes or both, it is clear that change
is inevitable. Nor are the opinions of one particular legislation in
one particular country constrained by one particular ideology going
to be dispositive in this regard. The Web is a global infrastructure
and is regulated as such. The deployment of GDPR in the EU has
proved that regulatory arbitrage works in both directions and
especially so when control is concentrated in a small number of
enterprises.
1.3. User experience
When Cascading Style Sheets were first proposed in 1994, the design
goal was to enable users to control the presentation of information
to best suit their needs. Needless to say, this goal is long since
forgotten as the user has been transformed from customer to product.
This conception of user-as-product is most apparent in the design of
social media properties such as Facebook where the ability of the
user to interact is ruthlessly constrained. Users are given the
absolute bare minimum of control over their environment possible so
as to maintain the illusion of participation.
Limiting the modes of user interaction was probably one of the
essential innovations required for social media to scale before users
were used to the modality. But is it necessary now? When social
media was new to most users, an environment that only allowed
favorable responses to posts provided a welcoming impression. Today
it means that there is no tool I can use to tell facebook that I do
not wish to see material that is bigoted, ignorant or intentionally
misleading unless the material is so egregious as to merit a report.
The core failure here is that the Web only allows Web designers to
create compelling user experiences for their users. The Web does not
allow users to create compelling user experiences for themselves.
Hallam-Baker Expires November 13, 2019 [Page 4]
Internet-Draft PHB Aggregation May 2019
1.4. The wider context
IETF Working Groups are traditionally established with a charter
focused on a scope that is as narrowly focused as possible so as to
minimize both the time taken to arrive at consensus and the
implementation burden. While well intentioned, it is important to
recognize that narrowing the problem scope necessarily reduces the
incentives for early adopters.
One of the chief difficulties in developing any new Web technology is
that the incumbent technology and content providers are focused on
serving a global market of several billion users. New technologies
are of little interest unless they provide immediate access to
millions of users at the very least. It is useful therefore to
consider non-commercial applications with similar requirements and in
particular specialist applications serving small communities that may
be highly motivated to deploy.
One area that is currently poorly served is the basis for most IETF
work: mailing lists. While mailing lists represented the pinnacle of
technology in the 1980s, they are long past their prime. Every
member of a mailing list receives a copy of every message on every
one of their devices that reads mail through a dedicated MUA. The
affordances for subscribing to (and unsubscribing!) from mailing
lists are ad hoc contrivances and there is no support for end-to-end
security with respect to either confidentiality or integrity.
Another area that is underserved is bulletin boards and forums. One
of the reasons that social media has become highly concentrated is
that bulletin boards represent isolated islands which many users only
ever encounter by chance. It is unlikely many people would discover
that a site called Dewback Wing is the place to find plans for
building an copy of the original Enterprise Captain's Chair unless
someone who already knew this told them. It is highly unlikely many
people would know that such a guide even existed.
2. The Technology Gap
That the Web does not provide an ideal user experience for users is
proved by the fact that most major content providers have developed
special purpose mobile apps to view the content they provide. Such
apps allow the content provider to control every aspect of the
presentation of the content to the user but rarely provide much if
any incentive for the user. Randall Monroe's summary of the user
proposition is still accurate: "Want to visit an incomplete version
of our Web site where you can't zoom? Download our app!".
Hallam-Baker Expires November 13, 2019 [Page 5]
Internet-Draft PHB Aggregation May 2019
Equally problematic is the fact that few mobile apps support
hypertext linking and those that do rarely refer the user to the
corresponding mobile app if installed. So, despite the fact that
most mobile apps are merely a thin veneer on a captive browser, they
are a dead end as far as the network hypertext model goes.
One of the few benefits that some mobile apps provide is the ability
to read content in offline mode. But this is rarely implemented in
2.1. Content Interaction
One of the core technology advances that is implicit in the workshop
scope is the development of a generic application that serves as a
reader for aggregate content. For the purposes of discussion, it is
assumed such an application would be separate from but tightly
coupled to Web and News clients and share the same library
foundations.
Such a client should provide for user interaction and not just
passive consumption of content and should put the user in direct
control of their user experience selecting the information sources
and the filtering criteria for content delivery.
It is important to remember that just as Facebook is merely USENET on
steroids, the next major advance in social networking might be merely
a new twist on an old theme.
For example, shared bookmarking has been explored in the past but is
currently in abeyance. Let us imagine that Alice, Bob and a few
thousand close friends use a browser that allows them to bookmark Web
pages as they view and nominate pages of interest (with optional
annotations). The users might make their trails publicly visible or
limit distribution through access control. The curated feeds
generated through such a system might in turn be read by a separate
constituency of curators who would use them to predict content that
their subscribers might be interested in on the basis of their
trails.
This model is very close to what we see in social media today but
with one crucial difference: the user chooses their feed curators and
can switch at any time. This might be a step towards restoring the
balance between content provision and content discovery since users
can subscribe to multiple curations of their feeds and drop those
which provide too little that is of interest or too much that is
objectionable.
Hallam-Baker Expires November 13, 2019 [Page 6]
Internet-Draft PHB Aggregation May 2019
2.2. Payments
The biggest gap in current Web technology is that payment for content
is largely limited to supporter and subscription models. This
provides a viable business proposition for content providers offering
material important enough to be worth $30 a year or more. But there
is little support for the far more numerous content providers
publishing individual articles.
Credit card payment for individual articles disrupts the user
experience. But payment systems that are too seamless become rife
with fraud as the situation with premium rate telephone calling
demonstrates.
One mechanism that might grow the market for paid content is a model
in which subscribers to one content provider would receive no-cost
access to normally paid content on other sites with a system of
settlements to share revenues. For example, Alice subscribes to
Bob's Boy-Band fanzine which has a link to an article on Carol's
Concert Club reviewing the band. Since she is a subscriber to BBB,
Alice doesn't need to pay to view the article, but Carol receives a
small settlement from Bob.
The precise details of the settlements system can probably be left to
market forces, provided that the technology provides the necessary
information and security controls.
3. Mathematical Mesh
The Mathematical Mesh is a cryptographic infrastructure designed to
make the Internet easier to use by making it more secure.
Many if not most of the frustrations users suffer when using Internet
applications today can be traced back to use of security systems that
are poorly designed and woefully implemented. Passwords are
difficult and expensive for users to use at the best of times.
Correctly applied, public key cryptography offers the highest level
of practical security with no compulsory impact on the user
experience. A security protocol that requires user effort is a
protocol that isn't going to be used. A security protocol should
provide security without getting in the user's way or demanding their
attention. The only time when a security protocol should affect the
user experience is when the user has a security concern at which
point the application should provide the user with the information
they need to make a security decision in a form they can understand.
Hallam-Baker Expires November 13, 2019 [Page 7]
Internet-Draft PHB Aggregation May 2019
Like the Web, the Mesh is a collection of interdependent
technologies, some of which are outside the scope of this workshop.
The features of the Mesh that are relevant to the workshop scope
include:
o The ability to provision keys to all the Mesh-enabled devices
owned or controlled by the user. These include desktop, laptop,
mobile and IoT devices.
o The ability to share 'catalogs' comprising sets of data entries
between devices. These include catalogs of bookmarks, passwords
and calendar items.
o A cryptographic container format that may be used as either an
archive format or as a syndication format.
o A end-to-end secure infrastructure for short messages.
Realizing these capabilities securely requires the use of
cryptographic techniques not currently supported by OpenPGP [RFC4880]
or CMS [RFC5652] . Rather than attempting to construct end-to-end
security guarantees as a layer on top of an application protocol
(e.g. S/MIME over SMTP), the Mesh is built on a presentation layer
(DARE) that provides end-to-end security by default.
The academic field of cryptography has grown exponentially as a
result of the Web and as a result of the market for commercial
cryptography. But the cryptographic repertoire employed in IETF
protocols remains unchanged since the closure of the PEM working
group. We have improved signature, digest and encryption algorithms
and we have formalized the definition of key wrapping and key
derivation. But we do not use any new cryptographic primitives
beyond the original canon.
Moving from one key cryptography to two revolutionized the
information security field. Use of separate keys for encryption and
decryption enables the encryption role to be separated from the
decryption role. The Mesh makes use of public key protocols that
make use of three keys and more.
The Mesh enforces cryptographic hygiene making use of separate keys
for separate purposes and for separate applications and for separate
devices. This results in a lot of keys but the consistency of
requiring every system to apply a common set of best practices
affords the simplicity necessary to make the system practical.
Hallam-Baker Expires November 13, 2019 [Page 8]
Internet-Draft PHB Aggregation May 2019
3.1. Management of private keys across devices
The core of the Mesh is the ability to securely manage sets of
cryptographic keys across multiple devices with minimal user
interaction. Almost every well-formed information security problem
has a simple cryptographic solution provided that every device
belonging to a user has a unique public key pair and the public keys
belonging to the devices are known.
The chief obstacle to using public key-based authentication in place
of password credentials is that while every device that a user might
use to surf the Web has an affordance for password entry, almost none
allow entry of a private key. Nor is this likely to change as
devices become smaller and less likely to provide a standardized
means of introducing a smart card or token.
The Mesh provides a personal PKI which allows the user to provision
device-specific authentication credentials to every device they
'connect' to their personal Mesh. This is combined with an end-to-
end secure password manager which permits devices connected to a
personal Mesh to access the user's legacy credentials.
Public key pairs are provisioned in the Mesh using a co-generation
approach based on work by Matt Blaze and Torben Pedersen. Every
device has a unique set of device key pairs that are either generated
on the device itself or provisioned during manufacture. When a
device is connected to a user's profile, a second set of key pairs is
generated by the user's administration device. It is the combination
of the two sets of keys that is used to perform every Mesh function
on the device. This provides protection against a single point of
failure.
3.2. Dare Container
Data At Rest Encryption [draft-hallambaker-mesh-dare] is a
cryptographic message syntax based on JSON/JOSE that provides a set
of capabilities that may be loosely described as 'blockchain with
encryption'. As with Certificate Transparency [RFC6962] ,
incremental integrity checking may be provided by a Merkle Tree.
Incremental encryption is also supported allowing a single key
exchange to be applied to multiple container entries by means of a
uniquely salted Key Derivation Function [RFC5869]
Dare Container is used within the Mesh to support creation of
catalogs (which contain sets of items) and spools (which contain
queues of messages). The features it supports are also well suited
for use as a syndication format or an archive format.
Hallam-Baker Expires November 13, 2019 [Page 9]
Internet-Draft PHB Aggregation May 2019
There are clear advantages to employing an archive format designed to
support encryption and authentication. The Dare format allows large
numbers of entries of any size (up to 2^63 bytes) to be encrypted
under a single public key exchange and authenticated by means of a
single signature. Furthermore, containers may be redacted to drop
entries that are irrelevant or have been updated without affecting
confidentiality or integrity.
This approach allows the same technology to be applied to package as
a single file:
o A Web page consisting of a base HTML document, CSS style sheets,
scripts and transcluded images.
o A Web site consisting of multiple base HTML documents referencing
a shared set of images and scripts.
o Entries in a discussion on a Web page.
Furthermore, containers may be aggregated or redacted as required. A
container describing an individual page may be extracted from a
container describing a site and containers describing multiple pages
may be combined to form a site.
3.3. Creator-to-consumer end-to-end Web security.
Since the release of TLS in 1994, Web security has focused on
securing data in transit. HTTPS is used to protect the provisioning
of new content to Web servers and for distribution of the content
from the Web server to the reader. But the content itself sits in
the clear in the cloud. As a result, almost every disclosure breach
is a breach of data at rest.
The Mesh provides true Data At Rest security by applying key
splitting techniques to the private key used to decrypt data. As
with existing CRM schemes, these techniques allow an administrator to
grant or remove access privileges to data stored on a remote server.
Unlike existing techniques, no decryption keys are stored on the
server itself. A breach of the server only results in disclosure of
encrypted data and some random numbers.
3.4. Deployment strategy
The first stage in that strategy is focused on applications that
deliver value to individual users even if there are no other users of
the Mesh. Management of credentials and keys across multiple devices
is such an application. Management of usernames and passwords is
tedious for everyone. Commercial password managers are expensive and
Hallam-Baker Expires November 13, 2019 [Page 10]
Internet-Draft PHB Aggregation May 2019
currently offer vague security guarantees at best. The Mesh is an
open specification that offers true end-to-end security with seamless
ease of use. Management of OpenPGP, S/MIME and SSH keys pose similar
challenges. While every system manager uses SSH it is a very rare
administrator who bothers to generate separate keypairs for each of
their devices and even rarer that they delete device keys after a
device is decommissioned.
The second stage is to focus on applications that deliver value to
compact groups of users within a niche community. The CRM
capabilities of the Mesh are likely to be of interest within
enterprises focused on health care, defense and other industries
where maintaining confidentiality is more important than direct
interoperation with other enterprises. The Mesh also provides an
improvement on traditional second factor authentication schemes which
allows the relying party to ask for confirmation of specific actions
for specific purposes and for a non-repudiable audit trail of every
interaction to be maintained.
The final stage of the deployment strategy is to join up the
communities of users established in phase two to form a sufficient
critical mass to change the Internet as a whole.
3.5. Shared Bookmarks
The shared bookmarks environment described in this paper is a part of
the second phase of the Mesh deployment strategy. A large part of
the value proposition offered by Facebook to users is the ability to
share links to Web content and to comment on them.
The Mesh allows bookmarks to be shared and commented on within closed
groups of users such as a group of employees within a company or
researchers within a field.
While existing social media allows users to establish closed groups,
ownership of those groups ultimately rests with the social media
platform and not the members of the groups themselves. Vesting
ownership of the group in its members allows the membership to have
control over the selection of administrators and moderators and the
criteria for posting and admission to the group.
Furthermore, selection of articles to view may be made by each
individual member using the tools and platforms of their choice that
best serve their needs.
The content that is prioritized on such platforms today is the
content that maximizes engagement and mouse clicks. The hatemonger,
Hallam-Baker Expires November 13, 2019 [Page 11]
Internet-Draft PHB Aggregation May 2019
the crank and the disinformation warrior are chosen because their
lies generate more engagement than facts or expert opinion.
4. References
4.1. Informative References
[draft-hallambaker-mesh-dare]
Hallam-Baker, P., "Mathematical Mesh Part III : Data At
Rest Encryption (DARE)", draft-hallambaker-mesh-dare-01
(work in progress), April 2019.
[iab-avertising-2019]
"[Reference Not Found!]".
[RFC4880] Callas, J., Donnerhacke, L., Finney, H., Shaw, D., and R.
Thayer, "OpenPGP Message Format", RFC 4880,
DOI 10.17487/RFC4880, November 2007.
[RFC5652] Housley, R., "Cryptographic Message Syntax (CMS)", STD 70,
RFC 5652, DOI 10.17487/RFC5652, September 2009.
[RFC5869] Krawczyk, H. and P. Eronen, "HMAC-based Extract-and-Expand
Key Derivation Function (HKDF)", RFC 5869,
DOI 10.17487/RFC5869, May 2010.
[RFC6962] Laurie, B., Langley, A., and E. Kasper, "Certificate
Transparency", RFC 6962, DOI 10.17487/RFC6962, June 2013.
4.2. URIs
[1] http://mathmesh.com/Documents/draft-hallambaker-iab-
aggregation.html
Author's Address
Phillip Hallam-Baker
Email: phill@hallambaker.com
Hallam-Baker Expires November 13, 2019 [Page 12]