Episode 61

The Future of Authenticating Your Data

00:00:00
/
01:07:32

March 12th, 2021

1 hr 7 mins 32 secs

Your Hosts
Special Guest
Tags

About this Episode

Katherine Druckman and Doc Searls talk to Dave Huseby about the authentic data economy, and the future of authentication.

Subscribe to our newsletter.

Reality 2.0 around the web:
Site/Blog/Newsletter
FaceBook
Twitter
YouTube
Mastodon

Support Reality 2.0

Episode Links

  • The Authentic Data Economy. Universal Digital Trust at Global Scale | by dwh | Feb, 2021 | Medium — To this day — even with mass computerization — trust-based interactions stubbornly resist digitization and remain at human scale simply because of the way we keep and maintain authentic data records. Tasks such as opening a bank account, having a document notarized, or signing a contract typically involves an in-person meeting to present the authentic data records (e.g. government identification, proof of funds, etc) and to sign a “wet” signature. However, now that we live in a reality twisted by the DNA strands of the COVID-19 virus, how do we ever hope to get back to in-person business as usual and trust as usual? Even if we can vaccinate against the virus and restore normal human interaction, the need for a more lasting technological solution for establishing trust remotely and transmitting it over great distances still exists. This, I believe, is the last great problem in technology and solving it will create the next crop of billion-dollar companies and billionaire founders.
  • IIW — The Internet Identity Workshop has been finding, probing and solving identity issues twice every year since 2005. We meet in the Computer History Museum in Mountain View, CA. Every IIW moves topics, code and projects downfield. Name an identity topic and it’s likely that more substantial discussion and work has been done at IIW than any other conference!
  • Merkle tree - Wikipedia — In cryptography and computer science, a hash tree or Merkle tree is a tree in which every leaf node is labelled with the cryptographic hash of a data block, and every non-leaf node is labelled with the cryptographic hash of the labels of its child nodes. Hash trees allow efficient and secure verification of the contents of large data structures. Hash trees are a generalization of hash lists and hash chains.
  • A Declaration of the Independence of Cyberspace | Electronic Frontier Foundation — Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather.

Episode Comments

Mastodon