<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Tue, 05 May 2026 05:38:31 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Reality 2.0 - Episodes Tagged with “Blockchain”</title>
    <link>https://www.reality2cast.com/tags/blockchain</link>
    <pubDate>Fri, 25 Feb 2022 07:00:00 -0500</pubDate>
    <description>Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as  Linux and open source and other current issues.
</description>
    <language>en</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Where tech meets reality. Navigating technology, privacy, security and open source. </itunes:subtitle>
    <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
    <itunes:summary>Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as  Linux and open source and other current issues.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>technology, privacy, open source, linux, security, cybersecurity, infosec, FOSS, FLOSS</itunes:keywords>
    <itunes:owner>
      <itunes:name>Katherine Druckman and Doc Searls</itunes:name>
      <itunes:email>podcast@reality2cast.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<item>
  <title>Episode 100: A Celebration with IPFS, Web3, and Home Automation</title>
  <link>https://www.reality2cast.com/100</link>
  <guid isPermaLink="false">9eb886ba-2a5b-4f6c-b158-732c03fa1bf9</guid>
  <pubDate>Fri, 25 Feb 2022 07:00:00 -0500</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/9eb886ba-2a5b-4f6c-b158-732c03fa1bf9.mp3" length="37286806" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Doc Searls, Katherine Druckman, Shawn Powers, and Petros Koutoupis celebrate our 100th episode and talk Web3, IPFS, and home automation.</itunes:subtitle>
  <itunes:duration>43:43</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Doc Searls, Katherine Druckman, Shawn Powers, and Petros Koutoupis celebrate our 100th episode and talk Web3, IPFS, and home automation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guests: Petros Koutoupis and Shawn Powers.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, web3, blockchain, IPFS</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Doc Searls, Katherine Druckman, Shawn Powers, and Petros Koutoupis celebrate our 100th episode and talk Web3, IPFS, and home automation.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Petros Koutoupis and Shawn Powers.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="My first web3 webpage | Dries Buytaert" rel="nofollow" href="https://dri.es/my-first-web3-webpage">My first web3 webpage | Dries Buytaert</a> &mdash; How I built my first web3 webpage, and what I think about web3's potential.</li><li><a title="Apple’s Siri will finally work without an internet connection thanks to on-device processing - The Verge" rel="nofollow" href="https://www.theverge.com/2021/6/7/22522993/apple-siri-on-device-speech-recognition-no-internet-wwdc">Apple’s Siri will finally work without an internet connection thanks to on-device processing - The Verge</a> &mdash; Apple’s digital assistant Siri will process audio on-device by default in iOS 15, meaning you will be able to use the feature without an active internet connection. Apple says the upgrade will also make Siri faster.</li><li><a title="Our most popular episode! - Reality 2.0 Episode 28: Destroy This Podcast" rel="nofollow" href="https://www.reality2cast.com/28">Our most popular episode! - Reality 2.0 Episode 28: Destroy This Podcast</a> &mdash; Katherine Druckman, Doc Searls, and Petros Koutoupis talk about ownership, freedom, and convenience in the digital world.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Doc Searls, Katherine Druckman, Shawn Powers, and Petros Koutoupis celebrate our 100th episode and talk Web3, IPFS, and home automation.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Petros Koutoupis and Shawn Powers.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="My first web3 webpage | Dries Buytaert" rel="nofollow" href="https://dri.es/my-first-web3-webpage">My first web3 webpage | Dries Buytaert</a> &mdash; How I built my first web3 webpage, and what I think about web3's potential.</li><li><a title="Apple’s Siri will finally work without an internet connection thanks to on-device processing - The Verge" rel="nofollow" href="https://www.theverge.com/2021/6/7/22522993/apple-siri-on-device-speech-recognition-no-internet-wwdc">Apple’s Siri will finally work without an internet connection thanks to on-device processing - The Verge</a> &mdash; Apple’s digital assistant Siri will process audio on-device by default in iOS 15, meaning you will be able to use the feature without an active internet connection. Apple says the upgrade will also make Siri faster.</li><li><a title="Our most popular episode! - Reality 2.0 Episode 28: Destroy This Podcast" rel="nofollow" href="https://www.reality2cast.com/28">Our most popular episode! - Reality 2.0 Episode 28: Destroy This Podcast</a> &mdash; Katherine Druckman, Doc Searls, and Petros Koutoupis talk about ownership, freedom, and convenience in the digital world.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 76: Brian Fox on Voting Systems, Post-COVID Work, and Bash</title>
  <link>https://www.reality2cast.com/76</link>
  <guid isPermaLink="false">8cf621f6-bea7-41b3-9505-8ea3d718cf75</guid>
  <pubDate>Fri, 02 Jul 2021 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/8cf621f6-bea7-41b3-9505-8ea3d718cf75.mp3" length="102329116" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls talk to Brian Fox about voting systems, open source, work in the post-covid era, blockchain, programming languages, and more.</itunes:subtitle>
  <itunes:duration>1:02:55</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman and Doc Searls talk to Brian Fox about voting systems, open source, work in the post-covid era, blockchain, programming languages, and more.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://reality2cast.com/newsletter" target="_blank" rel="nofollow noopener"&gt;Subscribe to our newsletter.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guest: Brian Fox.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, voting, blockchain, bash</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Brian Fox about voting systems, open source, work in the post-covid era, blockchain, programming languages, and more.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Brian Fox.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Brian Fox (computer programmer) - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Brian_Fox_(computer_programmer)">Brian Fox (computer programmer) - Wikipedia</a> &mdash; Brian Jhan Fox (born 1959) is an American computer programmer and free software advocate. He is the original author of the GNU Bash shell, which he announced as a beta in June 1989.[1] He continued as the primary maintainer of bash until at least early 1993.[2][3] Fox also built the first interactive online banking software in the U.S. for Wells Fargo in 1995,[4] and he created an open source election system in 2008.</li><li><a title="Opinion | To Protect Voting, Use Open-Source Software - The New York Times" rel="nofollow" href="https://www.nytimes.com/2017/08/03/opinion/open-source-software-hacker-voting.html">Opinion | To Protect Voting, Use Open-Source Software - The New York Times</a> &mdash; Although Russian hackers are reported to have tried to disrupt the November election with attacks on the voting systems of 39 states, the consensus of the intelligence community is that they were probably unsuccessful in their efforts to delete and alter voter data. But another national election is just 15 months away, and the risk that those working on behalf of President Vladimir Putin of Russia could do real damage — and even manage to mark your ballot for you or altering your vote — remains.

Since the debacle of the 2000 election (remember hanging chads?) American election machinery has been improved to reduce the chances of mis-tallying votes, outright fraud and attacks by hackers. These improvements brought with them a new concern: lack of software security. Most voting machines’ software can now be easily hacked. This is in large part because the current voting systems use proprietary software based on Microsoft’s operating system.</li><li><a title="Gerald Jay Sussman - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Gerald_Jay_Sussman">Gerald Jay Sussman - Wikipedia</a> &mdash; Gerald Jay Sussman (born February 8, 1947) is the Panasonic Professor of Electrical Engineering at the Massachusetts Institute of Technology (MIT). He received his S.B. and Ph.D. degrees in mathematics from MIT in 1968 and 1973 respectively. He has been involved in artificial intelligence (AI) research at MIT since 1964. His research has centered on understanding the problem-solving strategies used by scientists and engineers, with the goals of automating parts of the process and formalizing it to provide more effective methods of science and engineering education. Sussman has also worked in computer languages, in computer architecture and in Very Large Scale Integration (VLSI) design.[1]</li><li><a title="Lisp (programming language) - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Lisp_(programming_language)">Lisp (programming language) - Wikipedia</a> &mdash; Lisp (historically LISP) is a family of programming languages with a long history and a distinctive, fully parenthesized prefix notation.[3] Originally specified in 1958, Lisp is the second-oldest high-level programming language in widespread use today. Only Fortran is older, by one year.[4][5] Lisp has changed since its early days, and many dialects have existed over its history. Today, the best-known general-purpose Lisp dialects are Racket, Common Lisp, Scheme and Clojure.</li><li><a title="Pwnie Awards - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Pwnie_Awards">Pwnie Awards - Wikipedia</a> &mdash; The Pwnie Awards recognize both excellence and incompetence in the field of information security. Winners are selected by a committee of security industry professionals from nominations collected from the information security community.[2] The awards are presented yearly at the Black Hat Security Conference.[3]</li><li><a title="Z shell - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Z_shell">Z shell - Wikipedia</a> &mdash; The Z shell (Zsh) is a Unix shell that can be used as an interactive login shell and as a command interpreter for shell scripting. Zsh is an extended Bourne shell with many improvements, including some features of Bash, ksh, and tcsh.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Brian Fox about voting systems, open source, work in the post-covid era, blockchain, programming languages, and more.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Brian Fox.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Brian Fox (computer programmer) - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Brian_Fox_(computer_programmer)">Brian Fox (computer programmer) - Wikipedia</a> &mdash; Brian Jhan Fox (born 1959) is an American computer programmer and free software advocate. He is the original author of the GNU Bash shell, which he announced as a beta in June 1989.[1] He continued as the primary maintainer of bash until at least early 1993.[2][3] Fox also built the first interactive online banking software in the U.S. for Wells Fargo in 1995,[4] and he created an open source election system in 2008.</li><li><a title="Opinion | To Protect Voting, Use Open-Source Software - The New York Times" rel="nofollow" href="https://www.nytimes.com/2017/08/03/opinion/open-source-software-hacker-voting.html">Opinion | To Protect Voting, Use Open-Source Software - The New York Times</a> &mdash; Although Russian hackers are reported to have tried to disrupt the November election with attacks on the voting systems of 39 states, the consensus of the intelligence community is that they were probably unsuccessful in their efforts to delete and alter voter data. But another national election is just 15 months away, and the risk that those working on behalf of President Vladimir Putin of Russia could do real damage — and even manage to mark your ballot for you or altering your vote — remains.

Since the debacle of the 2000 election (remember hanging chads?) American election machinery has been improved to reduce the chances of mis-tallying votes, outright fraud and attacks by hackers. These improvements brought with them a new concern: lack of software security. Most voting machines’ software can now be easily hacked. This is in large part because the current voting systems use proprietary software based on Microsoft’s operating system.</li><li><a title="Gerald Jay Sussman - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Gerald_Jay_Sussman">Gerald Jay Sussman - Wikipedia</a> &mdash; Gerald Jay Sussman (born February 8, 1947) is the Panasonic Professor of Electrical Engineering at the Massachusetts Institute of Technology (MIT). He received his S.B. and Ph.D. degrees in mathematics from MIT in 1968 and 1973 respectively. He has been involved in artificial intelligence (AI) research at MIT since 1964. His research has centered on understanding the problem-solving strategies used by scientists and engineers, with the goals of automating parts of the process and formalizing it to provide more effective methods of science and engineering education. Sussman has also worked in computer languages, in computer architecture and in Very Large Scale Integration (VLSI) design.[1]</li><li><a title="Lisp (programming language) - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Lisp_(programming_language)">Lisp (programming language) - Wikipedia</a> &mdash; Lisp (historically LISP) is a family of programming languages with a long history and a distinctive, fully parenthesized prefix notation.[3] Originally specified in 1958, Lisp is the second-oldest high-level programming language in widespread use today. Only Fortran is older, by one year.[4][5] Lisp has changed since its early days, and many dialects have existed over its history. Today, the best-known general-purpose Lisp dialects are Racket, Common Lisp, Scheme and Clojure.</li><li><a title="Pwnie Awards - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Pwnie_Awards">Pwnie Awards - Wikipedia</a> &mdash; The Pwnie Awards recognize both excellence and incompetence in the field of information security. Winners are selected by a committee of security industry professionals from nominations collected from the information security community.[2] The awards are presented yearly at the Black Hat Security Conference.[3]</li><li><a title="Z shell - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Z_shell">Z shell - Wikipedia</a> &mdash; The Z shell (Zsh) is a Unix shell that can be used as an interactive login shell and as a command interpreter for shell scripting. Zsh is an extended Bourne shell with many improvements, including some features of Bash, ksh, and tcsh.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 61: The Future of Authenticating Your Data</title>
  <link>https://www.reality2cast.com/61</link>
  <guid isPermaLink="false">038c3b8f-19cb-4b7e-8683-fd90f21c8599</guid>
  <pubDate>Fri, 12 Mar 2021 07:00:00 -0500</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/038c3b8f-19cb-4b7e-8683-fd90f21c8599.mp3" length="58417315" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls talk to Dave Huseby about the authentic data economy, and the future of authentication.</itunes:subtitle>
  <itunes:duration>1:07:32</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman and Doc Searls talk to Dave Huseby about the authentic data economy, and the future of authentication.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://reality2cast.com/newsletter" target="_blank" rel="nofollow noopener"&gt;Subscribe to our newsletter.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guest: Dave Huseby.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, identity, blockchain, cryptography, authentication, self-sovereign identity</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Dave Huseby about the authentic data economy, and the future of authentication.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Dave Huseby.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="The Authentic Data Economy. Universal Digital Trust at Global Scale | by dwh | Feb, 2021 | Medium" rel="nofollow" href="https://dwhuseby.medium.com/the-authentic-data-economy-9802da67e1fa">The Authentic Data Economy. Universal Digital Trust at Global Scale | by dwh | Feb, 2021 | Medium</a> &mdash; To this day — even with mass computerization — trust-based interactions stubbornly resist digitization and remain at human scale simply because of the way we keep and maintain authentic data records. Tasks such as opening a bank account, having a document notarized, or signing a contract typically involves an in-person meeting to present the authentic data records (e.g. government identification, proof of funds, etc) and to sign a “wet” signature. However, now that we live in a reality twisted by the DNA strands of the COVID-19 virus, how do we ever hope to get back to in-person business as usual and trust as usual? Even if we can vaccinate against the virus and restore normal human interaction, the need for a more lasting technological solution for establishing trust remotely and transmitting it over great distances still exists. This, I believe, is the last great problem in technology and solving it will create the next crop of billion-dollar companies and billionaire founders.</li><li><a title="IIW" rel="nofollow" href="https://internetidentityworkshop.com/">IIW</a> &mdash; The Internet Identity Workshop has been finding, probing and solving identity issues twice every year since 2005. We meet in the Computer History Museum in Mountain View, CA. Every IIW moves topics, code and projects downfield. Name an identity topic and it’s likely that more substantial discussion and work has been done at IIW than any other conference!</li><li><a title="Merkle tree - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Merkle_tree">Merkle tree - Wikipedia</a> &mdash; In cryptography and computer science, a hash tree or Merkle tree is a tree in which every leaf node is labelled with the cryptographic hash of a data block, and every non-leaf node is labelled with the cryptographic hash of the labels of its child nodes. Hash trees allow efficient and secure verification of the contents of large data structures. Hash trees are a generalization of hash lists and hash chains.</li><li><a title="A Declaration of the Independence of Cyberspace | Electronic Frontier Foundation" rel="nofollow" href="https://www.eff.org/cyberspace-independence">A Declaration of the Independence of Cyberspace | Electronic Frontier Foundation</a> &mdash; Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Dave Huseby about the authentic data economy, and the future of authentication.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Dave Huseby.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="The Authentic Data Economy. Universal Digital Trust at Global Scale | by dwh | Feb, 2021 | Medium" rel="nofollow" href="https://dwhuseby.medium.com/the-authentic-data-economy-9802da67e1fa">The Authentic Data Economy. Universal Digital Trust at Global Scale | by dwh | Feb, 2021 | Medium</a> &mdash; To this day — even with mass computerization — trust-based interactions stubbornly resist digitization and remain at human scale simply because of the way we keep and maintain authentic data records. Tasks such as opening a bank account, having a document notarized, or signing a contract typically involves an in-person meeting to present the authentic data records (e.g. government identification, proof of funds, etc) and to sign a “wet” signature. However, now that we live in a reality twisted by the DNA strands of the COVID-19 virus, how do we ever hope to get back to in-person business as usual and trust as usual? Even if we can vaccinate against the virus and restore normal human interaction, the need for a more lasting technological solution for establishing trust remotely and transmitting it over great distances still exists. This, I believe, is the last great problem in technology and solving it will create the next crop of billion-dollar companies and billionaire founders.</li><li><a title="IIW" rel="nofollow" href="https://internetidentityworkshop.com/">IIW</a> &mdash; The Internet Identity Workshop has been finding, probing and solving identity issues twice every year since 2005. We meet in the Computer History Museum in Mountain View, CA. Every IIW moves topics, code and projects downfield. Name an identity topic and it’s likely that more substantial discussion and work has been done at IIW than any other conference!</li><li><a title="Merkle tree - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Merkle_tree">Merkle tree - Wikipedia</a> &mdash; In cryptography and computer science, a hash tree or Merkle tree is a tree in which every leaf node is labelled with the cryptographic hash of a data block, and every non-leaf node is labelled with the cryptographic hash of the labels of its child nodes. Hash trees allow efficient and secure verification of the contents of large data structures. Hash trees are a generalization of hash lists and hash chains.</li><li><a title="A Declaration of the Independence of Cyberspace | Electronic Frontier Foundation" rel="nofollow" href="https://www.eff.org/cyberspace-independence">A Declaration of the Independence of Cyberspace | Electronic Frontier Foundation</a> &mdash; Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather.</li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
