Topic V: PID rulebook #410
Replies: 3 comments 3 replies
-
On behalf of the Spanish Data Protection Authority (AEPD) The attached document contains our comments on this topic. Thank you very much for this opportunity to contribute to this important discussion. |
Beta Was this translation helpful? Give feedback.
-
Data protection considerations
We think that chapter 5 should not reinstate the same debates already happening in Topic G and in any case, if the technologies shall be listed again, then please add BBS# and the papers referenced above. We also think that privacy being a critical concern for eIDAS, the provision should be that “whatever it takes” will be done to update (optimally and pragmatically) the chosen technical specifications (or add new ones if necessary) to ensure the necessary data protection once a suitable ZKP scheme will have been decided upon (which should be soon given the timing constraints). |
Beta Was this translation helpful? Give feedback.
-
The PID rule-book is non-compliant with both the unlinkability requirement, NIS2 on state-of-the-art, basic needs for market competition to function on a fair basis and fundamental privacy regulation. The main issues is that the rulebook exclude Pseudonym PIDs which means that the EU Commission - through preventing member states or new innovation upgrading structures from issuing unlinkable root identities or anchors - define EU as a surveillance-only domain as any anchor-point is assumed to be linkable. This was explicitly rejected as part of eIDAS 2.0 regulation process, yet re-introduced through non-compliant technical structures. This problem CANNOT be resolved with zk-proofs as they are nowhere mature to establish a full identity suitable for engaging in transactions on equal basis as linkable identifikation identity. An additional problems is that this render smartphone-based wallets vulnurable as there is no way to procted data or structures from code change in the softkey-space or sidechannel surveillance. The implication is inherent failure of eIDAS 2.0 as the technical implementation does NOT provide what was intended or needed for citizens to engage in basic transactions without creating linkable personal data. Further notes: A pseudonym PID as an anchor MAY require additional transaction requirements to establish accountability, i.e. ex-ante deposited conditional means for e.g. a judge to establish link to a non-pseudonym PID. This should be limited in time for other than the citizen himself. A pseudonym PID as an anchor MAY require additional transaction requirements to establish linkability across pseudonym PID, i.e. ex-ante deposited conditional means for e.g. a judge to establish link from a non-pseudonym PID to issued pseudonym-PID in such as way that such a link cannot be established without the judge intervention. This should be limited in time for other than the citizen himself. Issuance of a Pseudonym PID can occur as a basic CA operation or in other qualified secure privacy-preserving ways which could involve e.g. WSCD/QCSD. This is an absolute minimum with no known workarounds. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Welcome to the discussion on the PID rulebook, part of the ongoing development of the Architecture and Reference Framework (ARF) for the European Digital Identity (EUDI) Wallet.
This discussion is based on the document Topic V - PID rulebook.
Currently, W3C VCDM 1.1 is referenced in the implementing acts, though it is understood to be a placeholder pending a final technical decision. This is because, in its current form, VCDM 1.1 remains an incomplete framework, lacking the necessary specifications to fully support the implementation of an EUDI Wallet.
To finalize the list of requirements and related technical specifications for implementing the PID based on the current ARF approach which envisions issuing the PID in two formats:
It is essential to fully define this second format by detailing all relevant aspects.
A clear and well-defined set of requirements and technical specifications for these components is crucial to accurately describe the PID and provide implementers with a robust framework for developing Wallet solutions.
In the current ARF, the decision leans toward adopting JWT-like Simple Attestations, which offer a simpler and widely compatible format, complemented by the SD-JWT-VC draft, but still several details are missing. Ongoing discussions emphasize the need to balance flexibility, interoperability, and security while avoiding unnecessary complexity.
This discussion is part of a structured process to refine and complete the ARF, with your input playing a vital role. We invite you to share your comments, insights, and suggestions here. Your contributions will be carefully reviewed and considered as we work towards the next version of the ARF, which will incorporate updates on this topic.
Thank you for participating in this important conversation.
Beta Was this translation helpful? Give feedback.
All reactions