The problems in the European Digital Identity (EUDI)

The problems in the European Digital Identity (EUDI)

Independent feedback on the dangers of the current EUDI implementation.

Contents

Introduction

The EUDI architecture reference framework (ARF) is built on the eIDAS2 specification, and its implementation act has been recently approved by representatives of EU’s member states. The European Commission has just ratified its adoption.

What EUDI should be

I take this stance because I want Europe to be excellent to all its citizens. We should develop our technological solutions following a human-centric approach grounded on principles of privacy, fairness, and inclusion.

The motivation behind EUDI is that of achieving strategic autonomy for our public and social services, but its realization goes in the opposite direction, effectively putting in the hands of mobile OS manufacturers core interaction channels with the institutions governing our society.

As it is today, EUDI has lost my trust, and it does not deserve yours either.

I will do my best to enumerate the reasons.

Fairness issue

What EUDI’s entertaining announcements often omit to say is that this system will not just issue but also revoke the digital identity credentials of European citizens. And revocation is an extremely delicate function with huge fairness implications. In the words of the European Commission EUDI will make us “enjoy” secure cross-border identification for services like:

🚗 Digital driving license
🩺 Access to medical prescriptions
📧 Digital signature
💳 New bank account
🧳 Travel documents

Considering this I cannot stress enough how important the governance of a revocation mechanism is. In EUDI’s implementation today this is a single point of failure where issuer corruption can cause huge damage to persecuted minorities and targeted subjects: it delegates the revocation issuance to a single entity instead of requiring more approvals by a quorum of stakeholders.

This creates a fairness problem that EUDI refuses to contemplate.

In other words, as it is now, a single party can interdict a person to access all these services. This is not good, and it does not have to be this way (technically speaking): we have shown that it can be done in a more resilient way, requiring agreement on the matter by multiple parties, in a paper we published.

SD-BLS: Privacy Preserving Selective Disclosure of Verifiable Credentials with Unlinkable Threshold Revocation
Ensuring privacy and protection from issuer corruption in digital identity systems is crucial. We propose a method for selective disclosure and privacy-preserving revocation of digital credentials using second-order Elliptic Curves and Boneh-Lynn-Shacham (BLS) signatures. We make holders able to present proofs of possession of selected credentials without disclosing them, and we protect their presentations from replay attacks. Re-vocations may be distributed among multiple revocation issuers using publicly verifiable secret sharing (PVSS) and activated only by configurable consensus, ensuring robust protection against issuer corruption. Our system’s unique design enables extremely fast revocation checks, even with large revocation lists, leveraging optimized hash map lookups.

open access: https://arxiv.org/abs/2406.19035

Where we demonstrate it is possible to have a multi-stakeholder governance of revocation issuance.

Privacy issue

EUDI will endanger the privacy of citizens using it because of the choice of weak cryptography algorithms that may leak information in certain situations, for instance in case of issuer-verifier collusion. The Cryptographers Feedback document explains this in detail: world-class researchers wrote and signed this document expressing important concerns on the cryptography adopted and its level of privacy, but EUDI acknowledged it without solving any of the problems raised so far.

Cryptographers’ Feedback on the EU Digital Identity’s ARF 📥 https://files.dyne.org/eudi/cryptographers-feedback-june2024.pdf

A year before this feedback also the European GSM Association has issued a worrying response to the EUDI plans, and the concerns it raised back then are still actual

eIDAS 2.0 and Privacy. Official Response. GSMA Europe. June 2023📥 https://files.dyne.org/eudi/GSMA-response-eIDAS-june2023.pdf

Security Issue

The security model of the EUDI wallet component relies on the Trusted Execution Environment (TEE) layer provided by mobile OS manufacturers: it gives up the use of advanced cryptography to be compatible with an API controlled by an oligopoly of foreign companies. This hands over the governance of EUDI algorithms, and potentially the control and monitoring of all transactions, to Google and Apple, who are now leading every session of the implementation acts.

As if this would not be enough of a disaster, most EUDI “experts” involved seem to ignore the fact that mobile TEEs are not secure at all!

Physical and Software Based Fault Injection Attacks Against TEEs in Mobile Devices: A Systemisation of Knowledge
Trusted Execution Environments (TEEs) are critical components of modern secure computing, providing isolated zones in processors to safeguard sensitive data and execute secure operations. Despite their importance, TEEs are increasingly vulnerable to fault injection (FI) attacks, including both physical methods, such as Electromagnetic Fault Injection (EMFI), and software-based techniques. This survey examines these FI methodologies, exploring their ability to disrupt TEE operations and expose vulnerabilities in devices ranging from smartphones and IoT systems to cloud platforms. The study highlights the evolution and effectiveness of non-invasive techniques, such as EMFI, which induce faults through electromagnetic disturbances without physical modifications to hardware, making them harder to detect and mitigate. Real-world case studies illustrate the significant risks posed by these attacks, including unauthorised access, privilege escalation, and data corruption. In addition, the survey identifies gaps in existing TEE security architectures and emphasises the need for enhanced countermeasures, such as dynamic anomaly detection and updated threat models. The findings underline the importance of interdisciplinary collaboration to address these vulnerabilities, involving researchers, manufacturers, and policymakers. This survey provides actionable insights and recommendations to guide the development of more robust TEE architectures in mobile devices, fortify FI resilience, and shape global security standards. By advancing TEE security, this research aims to protect critical digital infrastructure and maintain trust in secure computing systems worldwide.

All big players in the identity industry have since long been aware of exploited vulnerabilities in mobile TEEs and do not rely on them, for particularly good reasons!

Following EUDI ARF specs, wallet implementations should use Hardware Security Modules (HSMs) whenever found on mobile devices, a measure to defend wallet holders from side-channel attacks. The problem with this is that there are only a few mobile phone models in the world with certified HSMs, all extremely expensive high-end models. This also casts a shadow on the legitimacy of double standards for security, with a situation in which nation-states provide insecure infrastructure for citizens who cannot privately afford secure means to access it.

I believe that, if the European Blockchain Service Infrastructure (EBSI) serves its purpose, then we can solve the problem with a decentralized software approach that preserves our privacy and is more resilient to attacks. The advantage of such a solution would also be that we can update it without depending on mobile OS manufacturers. We demonstrated how to do this already on various use cases using Zenroom, a project born out of research funded by the European Commission.

Scalability issue

According to its ARF the EUDI system is not scalable: its use of antiquated cryptographic signature algorithms will impose the issuance of multiple attestation copies for each credential.

“This solution is not ideal: it introduces extra load for attestation issuers as well as additional complexity in the software. When using ordinary signature schemes such as ECDSA to sign the attestations, we see however no practical alternative.”

- NL Wallet Design Considerations
📥 https://files.dyne.org/eudi/NL-Wallet-Design-v1.0.3.pdf

EUDI partially solves some of its privacy issues at the cost of increasing operational complexity, to a degree that will quickly become unsustainable at large scale.

See also the Findynet Cooperative feedback to eIDAS implementation regulation:

Findynet’s feedback to eIDAS implementing acts | Findynet
Findynet Cooperative’s comments on the draft regulations the European Commission has published for views and feedback.

However scalability issues are fathomable, and there are solutions to them. It may seem that the increase of public sector’s technical debt is among EUDI’s undeclared purposes.

Obsolescence issue

The EUDI specifications are not concerned at all about Quantum Safety and makes no recommendation to face Quantum threats. This negligence makes EUDI already obsolete today.

National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems | The White House
NATIONAL SECURITY MEMORANDUM/NSM-10 MEMORANDUM FOR THE VICE PRESIDENT THE

National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems – The White House

Quantum-safe cryptography, also known as post-quantum cryptography (PQC), refers to cryptographic algorithms designed to be secure against attacks by quantum computers, which are foreseeably possible within the next 10 years. This makes quantum-safe cryptography especially important for long-term credential systems like ID cards or driving licenses: as quantum computing technology advances, the risk of quantum attacks on current cryptographic systems increases. This means that adversaries with access to quantum computers can use credentials signed today to steal private keys in the future.

Post-Quantum Cryptography: CISA, NIST, and NSA Recommend How to Prepare Now
The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and National Institute of Standards and Technology (NIST) warned that cyber actors could target our

Post-Quantum Cryptography: CISA, NIST, and NSA Recommend How to Prepare Now

European member states should ensure that their data remains secure both now and, in the future, preventing obsolescence and maintaining the integrity and confidentiality of sensitive information, by incorporating quantum-safe cryptography into authentication systems.

Methodological issues

There are two problems in the way the European Commission’s Directorate General for Communications Networks, Content and Technology (DGCNECT) drives the development of EUDI.

No threat model

The first one is the lack of a threat model analysis underpinning EUDI’s inception. A threat model is a critical component of any project focused on security and privacy, it serves as a foundational framework that identifies, evaluates, and mitigates potential risks and attack vectors, to anticipate and address security issues already in the architectural design phase. Threat models are there to provide an objective and scientific assessment of priorities that cannot be improvised by project managers, but are made by interdisciplinary groups of stakeholders focusing on security: they drive the decision-making process with insights that help everyone understand the potential impact of various threats, the effectiveness of mitigation strategies adopted, and helps prioritize security efforts on certain aspects and allocate resources on certain tasks.

Regulatory frameworks and industry standards require a threat model as part of their security protocols not just to ensures compliance but also to align with best practices in security management.

To mitigate this negligence, I am volunteering as facilitator of the Threat Model Community group at W3C (TMCG)

Our first focus at W3C TMCG is digital identity wallets, working with an interdisciplinary group that also includes experts from different disciplines and citizens from different backgrounds. We hope to contribute a document that can fill-in for this omission in EUDI, despite the fact it may be already too late: such a project should work on threat model analysis at its inception!

Marketing driven

The second problem is the way EUDI announces a new shiny digital tool to the European public is abusing marketing rhetoric above levels of alert. It is running biased advertisements across social networks, and running presentations at roadshows, without any critical notion of the impact and role of such a technology in society.

This is not the way it should be: the underpinning of European society is a secularized principle of rationality, a long tradition in epistemological processes of falsification, and openness to criticism and different views.

The marketing of EUDI’s implementation is far from these principles and makes Europe’s voice closer to blatant propaganda techniques used by our enemies to enslave their population under totalitarian regimes. I hope to be wrong in my interpretation, but right now this is how I feel every time I see a LinkedIn post on the EUDI fanfare: as people have already commented, this is all very creepy.

Conclusion

Unfortunately, EUDI as is today presents big problems and disregards criticism, warnings, and requests to review technical details, with results that harm the fairness of the system and the privacy of its participants, also limiting infrastructure security and scalability.

Citizens will be free to voluntarily adopt EUDI-compliant wallets available in each national member state, but this does not solve the problem that EUDI exists as a flawed system. It also gives no warranty about never becoming mandatory in the future.

I really hope that colleagues reading this declaration open to criticism and engage a more fruitful exchange with the cryptographic and security community. Together with other experts in the fields we have promoted open dialogue and a process of interdisciplinary and multi-stakeholder inclusion through recent initiatives like the Security Interest Group (SING) at W3C, in which I’m serving as facilitator for which I’ll do my best to welcome different opinions and run security analysis of verifiable credential schemes proposed. I will always be serving Europe’s interests with my expertise and always be open to cooperating to improve things if given the chance.

All problems I have listed here have solutions, but they may take time to solve, time that may not fit the plans of bureaucrats busy with matching overdue deadlines and incapable of comprehending the techno-political implications of this rush.

What worries me the most then is the condescending attitude of experts involved in this process, some euphorically, almost hysterically celebrating EUDI as a success, others silently witnessing the unfolding of what I predict to be an embarrassing disaster for Europe, or in the very best case an aborted project who has costed already more than a hundred million euros, and still counting.

Today we must understand the collective memory of Europeans will define EUDI’s initiative only after ripping the Maya veil of its marketing rhetoric, celebrative roadshows, and career opportunities. As it stands today then it will appear as a miserable show of false assumptions, ignorance and short-sighted choices marking a turning point in history for the erosion of Europe’s digital integrity and sovereignty.

Who am I?

My name is Denis Roio (Jaromil.dyne.org) and I know very well the subject after more than a decade leading developments for the European Commission, being the co-founder of the Italian Society of Cryptographers “De Componendis Cifris” and of Forkbomb BV. Months ago, our team working for the NGI TrustChain fund published the first 100% free and open-source EUDI-compliant implementation (DIDroom) complete with wallet and verifier apps already available on Android and iOS stores, as well as a complete issuer dashboard available in both SaaS and on-premises.

What I am writing about here may well be against the commercial interest of our company, while motivated by ethical and deontological values.

Yours faithfully

Jaromil

Jaromil

Inventor, Ph.D. Dyne.org think &do tank. - Website