Katherine Druckman and Kyle Rankin talk to Dave Huseby about his new approach to pseudonymous user authentication.Support Reality 2.0
- Authentication With Pseudonymity - Cryptid Technologies — Authentication With Pseudonymity How Elon can Legally Transform Twitter with Pseudonymous Free Speech by Dave Huseby “Authentication is important, but so is anonymity for many. A balance must be struck.” — Elon Musk (@elonmusk) In a well-studied and famous letter dated October 17, 1788 from James Madison to Thomas Jefferson, Madison discusses the proposed Bill of Rights and his plan for getting it passed in the first session of Congress. One fact that many do not know is that the letter is encrypted in part using a cipher invented by Thomas Jefferson. In the letter, Madison details the bitter and extremely contentious politics among the states, especially between the prominent Anti-Federalists and the Federalists like themselves. Madison’s chief concern was passing the Bill of Rights to quell any organized opposition to the Constitution. Political persecution was rampant and serious enough that Madison and Jefferson made careful use of encryption to avoid being doxxed and canceled because of their private political opinions.