-
Notifications
You must be signed in to change notification settings - Fork 8
New section on environmental impacts #27
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from 52 commits
850d182
c7355c9
7e4093e
eb86210
7561e14
29e2d39
b508dbb
c961d1f
cbb379b
78abe49
a1e9ee4
1e8fce6
2fb6306
5fe1f17
3064e2f
d65ed98
4820791
b13b97a
22c6943
90d6e16
e4b620c
a0a3a10
0fa5901
6c798be
93870c3
02317a8
5528479
f578a20
23a2273
989686b
3839b6c
1174832
6f51ec9
06a563a
67b5c83
9053df0
a476381
b0d199f
34b7d3a
f5b3c95
6bf9c01
2ee868d
2d82297
1310b0c
2e296c1
35e8147
171176c
bfe1e39
961c3cf
e046d08
b2f7768
4e2b768
eee9e0c
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change | ||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
@@ -1412,6 +1412,99 @@ <h3>Biometrics</h3> | |||||||||||||||||||||||||||
| </section> | ||||||||||||||||||||||||||||
| </section> | ||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||
| <section class="informative"> | ||||||||||||||||||||||||||||
| <h2>Ethical Considerations</h2> | ||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||
| <p> | ||||||||||||||||||||||||||||
| The following section details certain key areas of focus when implementing a | ||||||||||||||||||||||||||||
| new DID method, or implementing a solution that incorporates DIDs. | ||||||||||||||||||||||||||||
| </p> | ||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||
| <p> | ||||||||||||||||||||||||||||
| The <a | ||||||||||||||||||||||||||||
| href="https://www.w3.org/2001/tag/doc/ethical-web-principles/">W3C TAG | ||||||||||||||||||||||||||||
| Ethical Web Principles</a> document is a helpful guide | ||||||||||||||||||||||||||||
| when weighing ethical considerations of various technologies. | ||||||||||||||||||||||||||||
| </p> | ||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||
| <section class="informative"> | ||||||||||||||||||||||||||||
| <h3>Broad Ethical Principles</h3> | ||||||||||||||||||||||||||||
| <p> | ||||||||||||||||||||||||||||
| Decentralized Identifiers may come to underpin much of our digital life. This | ||||||||||||||||||||||||||||
| may include public social and career personas, as well as more private personas | ||||||||||||||||||||||||||||
| shared among friends and family. Identifiers representing these personas and | ||||||||||||||||||||||||||||
| relationships may be some of the most important in our lives, so great care | ||||||||||||||||||||||||||||
| will be taken when choosing an identifier system to support these critical | ||||||||||||||||||||||||||||
| activities. As with all things, the appropriate and ethical use of technology | ||||||||||||||||||||||||||||
| will be strongly considered when implementing items related to DIDs. | ||||||||||||||||||||||||||||
| </p> | ||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||
| <p> | ||||||||||||||||||||||||||||
| As noted in the <a | ||||||||||||||||||||||||||||
| href="https://www.w3.org/2001/tag/doc/ethical-web-principles/#principles"> | ||||||||||||||||||||||||||||
| Principles</a> section of the Ethical Web Principles, there are key goals that | ||||||||||||||||||||||||||||
| apply to all Web standards and technologies. DIDs are explicitly intended to | ||||||||||||||||||||||||||||
| help users get closer to several of these goals, especially the following: | ||||||||||||||||||||||||||||
| <ul> | ||||||||||||||||||||||||||||
| <li> | ||||||||||||||||||||||||||||
| <a href="https://www.w3.org/2001/tag/doc/ethical-web-principles/#privacy"> | ||||||||||||||||||||||||||||
| Privacy | ||||||||||||||||||||||||||||
| </a> | ||||||||||||||||||||||||||||
| </li> | ||||||||||||||||||||||||||||
| <li> | ||||||||||||||||||||||||||||
| <a href="https://www.w3.org/2001/tag/doc/ethical-web-principles/#control"> | ||||||||||||||||||||||||||||
| Individual Control | ||||||||||||||||||||||||||||
| </a> | ||||||||||||||||||||||||||||
| </li> | ||||||||||||||||||||||||||||
| <li> | ||||||||||||||||||||||||||||
| <a href="https://www.w3.org/2001/tag/doc/ethical-web-principles/#multi"> | ||||||||||||||||||||||||||||
| Device Independence | ||||||||||||||||||||||||||||
| </a> | ||||||||||||||||||||||||||||
| </li> | ||||||||||||||||||||||||||||
| </ul> | ||||||||||||||||||||||||||||
| </p> | ||||||||||||||||||||||||||||
| </section> | ||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||
| <section class="informative"> | ||||||||||||||||||||||||||||
| <h3>Other concerns as applied to DID method development</h3> | ||||||||||||||||||||||||||||
| <p class="advisement"> | ||||||||||||||||||||||||||||
| The following section reflects the views of some members of the working group. | ||||||||||||||||||||||||||||
| Additional PRs are welcome from the working group with additional points of view. | ||||||||||||||||||||||||||||
| </p> | ||||||||||||||||||||||||||||
|
Comment on lines
1472
to
1473
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Suggested change
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. @csuwildcat how about something like this: Thought being, that for areas where personal ID is involved I am highly skeptical of methods that do not opt for a proof of work approach at the current time, simply because of the privacy, security, and end user control compromises that are made with other approaches. However, there are a lot of use cases for DIDs that may have lesser requirements in those areas. A specific case I am thinking of is an area where our system issues a DID for discrete sources of data that have been identified. We often utilize did:key for this, which then gives us options depending on the scenario and environment as to how to approach anchoring, etc. if required, but also gives us the option to lighten compute and network load where appropriate, while still being able to benefit from a DID based approach.
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. The above is written in very strong subjective language (
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. @TallTed thoughts on the alternate language I offered? I think it could use some edits
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. @TallTed this is actually shifting the conversation to the more empirical topic of security, specifically protecting against "the full range of attack vectors, interdiction points, and centralization forces". These are critical aspects of system design that can be addressed with specific technical mitigations within implementations, thus it's probably a better basis for framing the considerations at bar. I must push back strongly against the hyperbolic framing that this is switching to a premise that implementers should "consume all energy to increase 'security'!". There are many things wrong here, not least of which is that electricity != emissions (all electricity generation worldwide = just 25% of emissions), but the whole point of these changes is to avoid opening this up to inherently subjective value perceptions that the other premise will draw into the discussion. If we assume a basis for articulation that invites subjective value perceptions, you may see PRs adding text that challenge people to justify why what may become some of the most important infra in human life is not valuable enough to protect with implementations that provide the highest levels of security. The most notable exemplar of a highly secure substrate commonly used today is equivalent to ~1/100th of the emissions impact from cow farts or 1/24th the emissions impact of clothes dryers. I personally believe what may become some of the most important infra for humans is worth ~1/100th of the emissions impact from cow farts or 1/24th the emissions impact of clothes dryers, but I don't want to have to ask others why they don't, which is why we should avoid that previous premise for articulating the considerations.
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
At minimum, for this phrasing to do what you apparently meant, "full range" should be "full known range", as new vulnerability specimens surface regularly. Next, please note that I referred nowhere to (presumably CO2 and other greenhouse gas) emissions in my words. I was reacting to what you said earlier --
-- which I read as it was written -- i.e., security over all other considerations, amongst which I'm pretty sure you'll agree we find energy consumption. Now, as to cow emissions... "Over 95 percent, actually, is from the mouth, from the front end of the cow." and In a year, a single cow can belch around 220 pounds of methane. Those articles show a cute new mask for the cows that can reduce their belch emissions by ~98%, and they've also separately found that adding a bit of seaweed (~1% or less, because of flavor issues -- not in the milk or beef, but the cows don't like >1%) to the cows' diet reduces overall emissions by ~80%, so your examples and/or figures will need some reworking. Regarding clothes dryers, are you talking about gas or electric? Or is this some magic aggregate? Not that this is actually relevant to the discussion at hand, which, to my mind boils down to -- Balance the concerns associated with the DID methods you're considering using or implementing, including their relative energy consumption at scale, their relative security, etc. Sometimes higher security [note: there is no "highest" nor unbreakable security] is worth more energy consumption. Sometimes lowering energy consumption is worth lower security. It's horses for courses. The right tool for the right job. Don't use a hammer to drive a screw. Don't use a saw to drive a nail. |
||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||
| <section class="informative"> | ||||||||||||||||||||||||||||
| <h3>Environmental Considerations</h3> | ||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||
| <p> | ||||||||||||||||||||||||||||
| The guiding principle that | ||||||||||||||||||||||||||||
| <a href="https://www.w3.org/2001/tag/doc/ethical-web-principles/#sustainable">the | ||||||||||||||||||||||||||||
| web must be an environmentally sustainable platform</a> should be followed. | ||||||||||||||||||||||||||||
| <br /> | ||||||||||||||||||||||||||||
| When implementing or utilizing a DID method, consideration should be given | ||||||||||||||||||||||||||||
| to the environmental impacts caused by the method. | ||||||||||||||||||||||||||||
| </p> | ||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||
| <p class="issue"> | ||||||||||||||||||||||||||||
| Some members of the working group feel it important that the [[DID-RUBRIC]] | ||||||||||||||||||||||||||||
| include environmental considerations as discussed in <a | ||||||||||||||||||||||||||||
| href="https://github.com/w3c/did-rubric/pull/51">this pull request</a> in | ||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||
| order that users might appropriately evaluate and compare relevant aspects | ||||||||||||||||||||||||||||
| of DID methods that might be applicable to their use cases. | ||||||||||||||||||||||||||||
| </p> | ||||||||||||||||||||||||||||
| <p>Many methods minimize environmental impact by leveraging existing infrastructure, such as | ||||||||||||||||||||||||||||
| the World Wide Web (with did:web) and Bitcoin (with did:btcr and did:ion). When considering any | ||||||||||||||||||||||||||||
| particular approach, whether creating a new method or selecting among current methods, care | ||||||||||||||||||||||||||||
| should be taken to distinguish between the marginal impact of the additional use of such | ||||||||||||||||||||||||||||
| infrastructure as a result of the DID method and the existing impact from current use. For example, | ||||||||||||||||||||||||||||
| the did:web implementation is unlikely to have a significant additive environmental impact above | ||||||||||||||||||||||||||||
| and beyond the existing World Wide Web. | ||||||||||||||||||||||||||||
| </p> | ||||||||||||||||||||||||||||
| </section> | ||||||||||||||||||||||||||||
mprorock marked this conversation as resolved.
Show resolved
Hide resolved
|
||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||
| </section> | ||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||
| </section> | ||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||
| <section> | ||||||||||||||||||||||||||||
| <h2>Future Work</h2> | ||||||||||||||||||||||||||||
| <p class="note"> | ||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||
Uh oh!
There was an error while loading. Please reload this page.