<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Thu, 30 Apr 2026 07:53:42 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Reality 2.0 - Episodes Tagged with “Cryptography”</title>
    <link>https://www.reality2cast.com/tags/cryptography</link>
    <pubDate>Fri, 27 May 2022 07:00:00 -0400</pubDate>
    <description>Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as  Linux and open source and other current issues.
</description>
    <language>en</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Where tech meets reality. Navigating technology, privacy, security and open source. </itunes:subtitle>
    <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
    <itunes:summary>Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as  Linux and open source and other current issues.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>technology, privacy, open source, linux, security, cybersecurity, infosec, FOSS, FLOSS</itunes:keywords>
    <itunes:owner>
      <itunes:name>Katherine Druckman and Doc Searls</itunes:name>
      <itunes:email>podcast@reality2cast.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<item>
  <title>Episode 113: Authentic Users and Data</title>
  <link>https://www.reality2cast.com/113</link>
  <guid isPermaLink="false">05da0bba-9307-442e-aaa0-478afbed3989</guid>
  <pubDate>Fri, 27 May 2022 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/05da0bba-9307-442e-aaa0-478afbed3989.mp3" length="61461946" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Doc Searls and Katherine Druckman talk to Dave Huseby of Cryptid.tech about pseudonymous authentication and verifiable data.</itunes:subtitle>
  <itunes:duration>1:18:53</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>Doc Searls and Katherine Druckman talk to Dave Huseby of Cryptid.tech about pseudonymous authentication and verifiable data.
Site/Blog/Newsletter (https://www.reality2cast.com)
FaceBook (https://www.facebook.com/reality2cast)
Twitter (https://twitter.com/reality2cast)
YouTube (https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q)
Mastodon (https://linuxrocks.online/@reality2cast) Special Guest: Dave Huseby.
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Dave Huseby of Cryptid.tech about pseudonymous authentication and verifiable data.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Dave Huseby.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Reality 2.0 Episode 112: Pseudonymous Authentication for Twitter" rel="nofollow" href="https://www.reality2cast.com/112">Reality 2.0 Episode 112: Pseudonymous Authentication for Twitter</a> &mdash; Katherine Druckman and Kyle Rankin talk to Dave Huseby about his new approach to pseudonymous user authentication.</li><li><a title="Reality 2.0 Episode 61: The Future of Authenticating Your Data" rel="nofollow" href="https://www.reality2cast.com/61">Reality 2.0 Episode 61: The Future of Authenticating Your Data</a> &mdash; Katherine Druckman and Doc Searls talk to Dave Huseby about the authentic data economy, and the future of authentication.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Dave Huseby of Cryptid.tech about pseudonymous authentication and verifiable data.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Dave Huseby.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Reality 2.0 Episode 112: Pseudonymous Authentication for Twitter" rel="nofollow" href="https://www.reality2cast.com/112">Reality 2.0 Episode 112: Pseudonymous Authentication for Twitter</a> &mdash; Katherine Druckman and Kyle Rankin talk to Dave Huseby about his new approach to pseudonymous user authentication.</li><li><a title="Reality 2.0 Episode 61: The Future of Authenticating Your Data" rel="nofollow" href="https://www.reality2cast.com/61">Reality 2.0 Episode 61: The Future of Authenticating Your Data</a> &mdash; Katherine Druckman and Doc Searls talk to Dave Huseby about the authentic data economy, and the future of authentication.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 96: Absolute Privacy Through Cryptography</title>
  <link>https://www.reality2cast.com/96</link>
  <guid isPermaLink="false">59b999ee-edef-4001-a371-d52586e9d4e3</guid>
  <pubDate>Fri, 21 Jan 2022 07:00:00 -0500</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/59b999ee-edef-4001-a371-d52586e9d4e3.mp3" length="66324117" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Doc Searls and Katherine Druckman talk to Dave Huseby about privacy, cryptography, and authentic data.</itunes:subtitle>
  <itunes:duration>1:18:28</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>Doc Searls and Katherine Druckman talk to Dave Huseby about privacy, cryptography, and authentic data.
Reality 2.0 around the web:
Site/Blog/Newsletter (https://www.reality2cast.com)
FaceBook (https://www.facebook.com/reality2cast)
Twitter (https://twitter.com/reality2cast)
YouTube (https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q)
Mastodon (https://linuxrocks.online/@reality2cast) Special Guest: Dave Huseby.
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Dave Huseby about privacy, cryptography, and authentic data.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Dave Huseby.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems | The White House" rel="nofollow" href="https://www.whitehouse.gov/briefing-room/presidential-actions/2022/01/19/memorandum-on-improving-the-cybersecurity-of-national-security-department-of-defense-and-intelligence-community-systems/">Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems | The White House</a> &mdash; This memorandum sets forth requirements for National Security Systems (NSS) that are equivalent to or exceed the cybersecurity requirements for Federal Information Systems set forth within Executive Order 14028 of May 12, 2021 (Improving the Nation’s Cybersecurity), and establishes methods to secure exceptions for circumstances necessitated by unique mission needs. </li><li><a title="Guess which government doesn&#39;t want you to use end-to-end encryption" rel="nofollow" href="https://betanews.com/2022/01/18/guess-which-government-doesnt-want-you-to-use-end-to-end-encryption/">Guess which government doesn't want you to use end-to-end encryption</a> &mdash; From a privacy point of view, there is much to love about end-to-end encryption, as employed by the likes of WhatsApp. But while users may delight in the knowledge that their communication is free from surveillance, there are some groups that have a different opinion.</li><li><a title="I Got Access to My Secret Consumer Score. Now You Can Get Yours, Too. - The New York Times" rel="nofollow" href="https://www.nytimes.com/2019/11/04/business/secret-consumer-score-access.html">I Got Access to My Secret Consumer Score. Now You Can Get Yours, Too. - The New York Times</a> &mdash; Little-known companies are amassing your data — like food orders and Airbnb messages — and selling the analysis to clients. Here’s how to get a copy of what they have on you.</li><li><a title="Black Teen Kicked Out Of Roller Rink Over Face Recognition | News | BET" rel="nofollow" href="https://www.bet.com/article/2lworg/black-teen-kicked-out-of-roller-rink-over-face-recognition">Black Teen Kicked Out Of Roller Rink Over Face Recognition | News | BET</a> &mdash; A face recognition-equipped Detroit roller rink reportedly kicked out a Black teen on June 10 after misidentifying her as a person who’d allegedly gotten into a fight there in March.</li><li><a title="The principles of user sovereignty | by 𝖉𝖜𝖍 | UX Collective" rel="nofollow" href="https://uxdesign.cc/the-principles-of-user-sovereignty-515ac83401f6">The principles of user sovereignty | by 𝖉𝖜𝖍 | UX Collective</a> &mdash; The first time I heard the phrase “user sovereignty” was while working at Mozilla on the Firefox web browser. Firefox ostensibly follows user sovereign design principles and respects its users. Mozilla has even baked it into their list of design principles on page 5 of the Firefox Design Values Booklet. But what does “user sovereignty” actually mean and what are the principles that define user-sovereign design?</li><li><a title="A Unified Theory of Decentralization | by 𝖉𝖜𝖍 | The Startup | Medium" rel="nofollow" href="https://medium.com/swlh/a-unified-theory-of-decentralization-151d6f39e38">A Unified Theory of Decentralization | by 𝖉𝖜𝖍 | The Startup | Medium</a> &mdash; All networks begin as only one thing; one neuron, one cell, one chip, one computer, or one user. One entity alone is not a network, but it is the starting point for understanding the unified theory of decentralization. One entity is fully sovereign, it has no connections to anything else that might influence or control it. One entity in isolation is empowered to act however it wants to strive for whatever results it seeks.</li><li><a title="The Web was Never Decentralized. Redecentralize the web is a fantasy | Design Warp" rel="nofollow" href="https://medium.com/design-warp/the-web-was-never-decentralized-bb066138c88">The Web was Never Decentralized. Redecentralize the web is a fantasy | Design Warp</a> &mdash; There are so many people today focused on “re-decentralizing the web.” They have a popular belief that when the web was invented it was a wonderfully optimistic vision of decentralization, governed by democratic principles and full of free information available through open access that all of humanity benefited from. They assume that originally all users of the web were well behaved and companies only wanted to help make the world better. Also, they think that somewhere along the line the web fell under the control of irresponsible corporations and governments and was contorted into the “broken and centralized” system that it is today.</li><li><a title="The Authentic Data Economy. Universal Digital Trust at Global Scale | by 𝖉𝖜𝖍 | Medium" rel="nofollow" href="https://dwhuseby.medium.com/the-authentic-data-economy-9802da67e1fa">The Authentic Data Economy. Universal Digital Trust at Global Scale | by 𝖉𝖜𝖍 | Medium</a> &mdash; All of us intuitively have a sense of what trust is and how to earn and maintain it as well as how to lose it. Trust never comes for free. The cost of earning trust is consistent trustworthy behavior over time. It forms our reputation in our social circles. But what happens when you have to do business outside of our personal social circles, such as with a new bank, or with a government agency far removed? How is trust established then? How is it transmitted to the distant institution to conduct business and how is it transmitted back? Over human history the solution has been to generate and keep official records about people and their activities. Some examples of official records are: Jane was born on this date, John earned his diploma from this university in this year, Judy received a license to practice medicine.</li><li><a title="Achieving Absolute Privacy. Cryptography Always Works, With or… | by 𝖉𝖜𝖍 | Medium" rel="nofollow" href="https://dwhuseby.medium.com/achieving-absolute-privacy-85460ac9eada">Achieving Absolute Privacy. Cryptography Always Works, With or… | by 𝖉𝖜𝖍 | Medium</a> &mdash; Absolute privacy on the internet is impossible, today. Why? Because nobody with the power to create it, wants it. The primary revenue model for the internet is based on surveillance making most investors aligned against privacy. </li><li><a title="Zero Architecture is the Way Forward | by 𝖉𝖜𝖍 | Medium" rel="nofollow" href="https://dwhuseby.medium.com/zero-architecture-is-the-way-forward-5a0080925c76">Zero Architecture is the Way Forward | by 𝖉𝖜𝖍 | Medium</a> &mdash; Inmy two most recent articles I discussed something called “Zero Architecture”. It is a new approach to designing decentralized systems using zero-trust security combined with business logic that operates entirely on zero-knowledge proofs — based on authentic data — and contains zero personally identifiable information. The primary motivation for this new way of thinking is building fully user-sovereign systems that automate regulatory compliance, drive out fraud, as well as eliminate surveillance capitalism and its attendant societal problems.
</li><li><a title="𝕿𝖍𝖊 𝕿𝖍𝖊𝖔𝖗𝖞 𝖔𝖋 𝕯𝖎𝖌𝖎𝖙𝖆𝖑 𝕲𝖆𝖙𝖊𝖘 | by 𝖉𝖜𝖍 | Medium" rel="nofollow" href="https://dwhuseby.medium.com/the-theory-of-digital-gates-9cd5073e1cb6">𝕿𝖍𝖊 𝕿𝖍𝖊𝖔𝖗𝖞 𝖔𝖋 𝕯𝖎𝖌𝖎𝖙𝖆𝖑 𝕲𝖆𝖙𝖊𝖘 | by 𝖉𝖜𝖍 | Medium</a> &mdash; In computer systems it is common to construct digital gates around a service. The most common example is a username and password login gate that does a combination of authentication (i.e. verifying who is accessing the service) and authorization (i.e. what functions of the service can be executed). This approach for gating digital access is being blindly applied — without deeper contemplation — to vaccine passports and digital gates in the physical world with the explicit goal of denying people access to resources that were considered a human right as recently as this past spring. It is time to present a theoretical model describing the oppressive characteristics of naïve pervasive digital gating of real-world access and show why identity cannot be an input available to digital gates.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Dave Huseby about privacy, cryptography, and authentic data.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Dave Huseby.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems | The White House" rel="nofollow" href="https://www.whitehouse.gov/briefing-room/presidential-actions/2022/01/19/memorandum-on-improving-the-cybersecurity-of-national-security-department-of-defense-and-intelligence-community-systems/">Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems | The White House</a> &mdash; This memorandum sets forth requirements for National Security Systems (NSS) that are equivalent to or exceed the cybersecurity requirements for Federal Information Systems set forth within Executive Order 14028 of May 12, 2021 (Improving the Nation’s Cybersecurity), and establishes methods to secure exceptions for circumstances necessitated by unique mission needs. </li><li><a title="Guess which government doesn&#39;t want you to use end-to-end encryption" rel="nofollow" href="https://betanews.com/2022/01/18/guess-which-government-doesnt-want-you-to-use-end-to-end-encryption/">Guess which government doesn't want you to use end-to-end encryption</a> &mdash; From a privacy point of view, there is much to love about end-to-end encryption, as employed by the likes of WhatsApp. But while users may delight in the knowledge that their communication is free from surveillance, there are some groups that have a different opinion.</li><li><a title="I Got Access to My Secret Consumer Score. Now You Can Get Yours, Too. - The New York Times" rel="nofollow" href="https://www.nytimes.com/2019/11/04/business/secret-consumer-score-access.html">I Got Access to My Secret Consumer Score. Now You Can Get Yours, Too. - The New York Times</a> &mdash; Little-known companies are amassing your data — like food orders and Airbnb messages — and selling the analysis to clients. Here’s how to get a copy of what they have on you.</li><li><a title="Black Teen Kicked Out Of Roller Rink Over Face Recognition | News | BET" rel="nofollow" href="https://www.bet.com/article/2lworg/black-teen-kicked-out-of-roller-rink-over-face-recognition">Black Teen Kicked Out Of Roller Rink Over Face Recognition | News | BET</a> &mdash; A face recognition-equipped Detroit roller rink reportedly kicked out a Black teen on June 10 after misidentifying her as a person who’d allegedly gotten into a fight there in March.</li><li><a title="The principles of user sovereignty | by 𝖉𝖜𝖍 | UX Collective" rel="nofollow" href="https://uxdesign.cc/the-principles-of-user-sovereignty-515ac83401f6">The principles of user sovereignty | by 𝖉𝖜𝖍 | UX Collective</a> &mdash; The first time I heard the phrase “user sovereignty” was while working at Mozilla on the Firefox web browser. Firefox ostensibly follows user sovereign design principles and respects its users. Mozilla has even baked it into their list of design principles on page 5 of the Firefox Design Values Booklet. But what does “user sovereignty” actually mean and what are the principles that define user-sovereign design?</li><li><a title="A Unified Theory of Decentralization | by 𝖉𝖜𝖍 | The Startup | Medium" rel="nofollow" href="https://medium.com/swlh/a-unified-theory-of-decentralization-151d6f39e38">A Unified Theory of Decentralization | by 𝖉𝖜𝖍 | The Startup | Medium</a> &mdash; All networks begin as only one thing; one neuron, one cell, one chip, one computer, or one user. One entity alone is not a network, but it is the starting point for understanding the unified theory of decentralization. One entity is fully sovereign, it has no connections to anything else that might influence or control it. One entity in isolation is empowered to act however it wants to strive for whatever results it seeks.</li><li><a title="The Web was Never Decentralized. Redecentralize the web is a fantasy | Design Warp" rel="nofollow" href="https://medium.com/design-warp/the-web-was-never-decentralized-bb066138c88">The Web was Never Decentralized. Redecentralize the web is a fantasy | Design Warp</a> &mdash; There are so many people today focused on “re-decentralizing the web.” They have a popular belief that when the web was invented it was a wonderfully optimistic vision of decentralization, governed by democratic principles and full of free information available through open access that all of humanity benefited from. They assume that originally all users of the web were well behaved and companies only wanted to help make the world better. Also, they think that somewhere along the line the web fell under the control of irresponsible corporations and governments and was contorted into the “broken and centralized” system that it is today.</li><li><a title="The Authentic Data Economy. Universal Digital Trust at Global Scale | by 𝖉𝖜𝖍 | Medium" rel="nofollow" href="https://dwhuseby.medium.com/the-authentic-data-economy-9802da67e1fa">The Authentic Data Economy. Universal Digital Trust at Global Scale | by 𝖉𝖜𝖍 | Medium</a> &mdash; All of us intuitively have a sense of what trust is and how to earn and maintain it as well as how to lose it. Trust never comes for free. The cost of earning trust is consistent trustworthy behavior over time. It forms our reputation in our social circles. But what happens when you have to do business outside of our personal social circles, such as with a new bank, or with a government agency far removed? How is trust established then? How is it transmitted to the distant institution to conduct business and how is it transmitted back? Over human history the solution has been to generate and keep official records about people and their activities. Some examples of official records are: Jane was born on this date, John earned his diploma from this university in this year, Judy received a license to practice medicine.</li><li><a title="Achieving Absolute Privacy. Cryptography Always Works, With or… | by 𝖉𝖜𝖍 | Medium" rel="nofollow" href="https://dwhuseby.medium.com/achieving-absolute-privacy-85460ac9eada">Achieving Absolute Privacy. Cryptography Always Works, With or… | by 𝖉𝖜𝖍 | Medium</a> &mdash; Absolute privacy on the internet is impossible, today. Why? Because nobody with the power to create it, wants it. The primary revenue model for the internet is based on surveillance making most investors aligned against privacy. </li><li><a title="Zero Architecture is the Way Forward | by 𝖉𝖜𝖍 | Medium" rel="nofollow" href="https://dwhuseby.medium.com/zero-architecture-is-the-way-forward-5a0080925c76">Zero Architecture is the Way Forward | by 𝖉𝖜𝖍 | Medium</a> &mdash; Inmy two most recent articles I discussed something called “Zero Architecture”. It is a new approach to designing decentralized systems using zero-trust security combined with business logic that operates entirely on zero-knowledge proofs — based on authentic data — and contains zero personally identifiable information. The primary motivation for this new way of thinking is building fully user-sovereign systems that automate regulatory compliance, drive out fraud, as well as eliminate surveillance capitalism and its attendant societal problems.
</li><li><a title="𝕿𝖍𝖊 𝕿𝖍𝖊𝖔𝖗𝖞 𝖔𝖋 𝕯𝖎𝖌𝖎𝖙𝖆𝖑 𝕲𝖆𝖙𝖊𝖘 | by 𝖉𝖜𝖍 | Medium" rel="nofollow" href="https://dwhuseby.medium.com/the-theory-of-digital-gates-9cd5073e1cb6">𝕿𝖍𝖊 𝕿𝖍𝖊𝖔𝖗𝖞 𝖔𝖋 𝕯𝖎𝖌𝖎𝖙𝖆𝖑 𝕲𝖆𝖙𝖊𝖘 | by 𝖉𝖜𝖍 | Medium</a> &mdash; In computer systems it is common to construct digital gates around a service. The most common example is a username and password login gate that does a combination of authentication (i.e. verifying who is accessing the service) and authorization (i.e. what functions of the service can be executed). This approach for gating digital access is being blindly applied — without deeper contemplation — to vaccine passports and digital gates in the physical world with the explicit goal of denying people access to resources that were considered a human right as recently as this past spring. It is time to present a theoretical model describing the oppressive characteristics of naïve pervasive digital gating of real-world access and show why identity cannot be an input available to digital gates.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 61: The Future of Authenticating Your Data</title>
  <link>https://www.reality2cast.com/61</link>
  <guid isPermaLink="false">038c3b8f-19cb-4b7e-8683-fd90f21c8599</guid>
  <pubDate>Fri, 12 Mar 2021 07:00:00 -0500</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/038c3b8f-19cb-4b7e-8683-fd90f21c8599.mp3" length="58417315" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls talk to Dave Huseby about the authentic data economy, and the future of authentication.</itunes:subtitle>
  <itunes:duration>1:07:32</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>Katherine Druckman and Doc Searls talk to Dave Huseby about the authentic data economy, and the future of authentication.
Subscribe to our newsletter. (https://reality2cast.com/newsletter)
Reality 2.0 around the web:
Site/Blog/Newsletter (https://www.reality2cast.com)
FaceBook (https://www.facebook.com/reality2cast)
Twitter (https://twitter.com/reality2cast)
YouTube (https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q)
Mastodon (https://linuxrocks.online/@reality2cast) Special Guest: Dave Huseby.
</description>
  <itunes:keywords>technology, privacy, open source, security, identity, blockchain, cryptography, authentication, self-sovereign identity</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Dave Huseby about the authentic data economy, and the future of authentication.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Dave Huseby.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="The Authentic Data Economy. Universal Digital Trust at Global Scale | by dwh | Feb, 2021 | Medium" rel="nofollow" href="https://dwhuseby.medium.com/the-authentic-data-economy-9802da67e1fa">The Authentic Data Economy. Universal Digital Trust at Global Scale | by dwh | Feb, 2021 | Medium</a> &mdash; To this day — even with mass computerization — trust-based interactions stubbornly resist digitization and remain at human scale simply because of the way we keep and maintain authentic data records. Tasks such as opening a bank account, having a document notarized, or signing a contract typically involves an in-person meeting to present the authentic data records (e.g. government identification, proof of funds, etc) and to sign a “wet” signature. However, now that we live in a reality twisted by the DNA strands of the COVID-19 virus, how do we ever hope to get back to in-person business as usual and trust as usual? Even if we can vaccinate against the virus and restore normal human interaction, the need for a more lasting technological solution for establishing trust remotely and transmitting it over great distances still exists. This, I believe, is the last great problem in technology and solving it will create the next crop of billion-dollar companies and billionaire founders.</li><li><a title="IIW" rel="nofollow" href="https://internetidentityworkshop.com/">IIW</a> &mdash; The Internet Identity Workshop has been finding, probing and solving identity issues twice every year since 2005. We meet in the Computer History Museum in Mountain View, CA. Every IIW moves topics, code and projects downfield. Name an identity topic and it’s likely that more substantial discussion and work has been done at IIW than any other conference!</li><li><a title="Merkle tree - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Merkle_tree">Merkle tree - Wikipedia</a> &mdash; In cryptography and computer science, a hash tree or Merkle tree is a tree in which every leaf node is labelled with the cryptographic hash of a data block, and every non-leaf node is labelled with the cryptographic hash of the labels of its child nodes. Hash trees allow efficient and secure verification of the contents of large data structures. Hash trees are a generalization of hash lists and hash chains.</li><li><a title="A Declaration of the Independence of Cyberspace | Electronic Frontier Foundation" rel="nofollow" href="https://www.eff.org/cyberspace-independence">A Declaration of the Independence of Cyberspace | Electronic Frontier Foundation</a> &mdash; Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Dave Huseby about the authentic data economy, and the future of authentication.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Dave Huseby.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="The Authentic Data Economy. Universal Digital Trust at Global Scale | by dwh | Feb, 2021 | Medium" rel="nofollow" href="https://dwhuseby.medium.com/the-authentic-data-economy-9802da67e1fa">The Authentic Data Economy. Universal Digital Trust at Global Scale | by dwh | Feb, 2021 | Medium</a> &mdash; To this day — even with mass computerization — trust-based interactions stubbornly resist digitization and remain at human scale simply because of the way we keep and maintain authentic data records. Tasks such as opening a bank account, having a document notarized, or signing a contract typically involves an in-person meeting to present the authentic data records (e.g. government identification, proof of funds, etc) and to sign a “wet” signature. However, now that we live in a reality twisted by the DNA strands of the COVID-19 virus, how do we ever hope to get back to in-person business as usual and trust as usual? Even if we can vaccinate against the virus and restore normal human interaction, the need for a more lasting technological solution for establishing trust remotely and transmitting it over great distances still exists. This, I believe, is the last great problem in technology and solving it will create the next crop of billion-dollar companies and billionaire founders.</li><li><a title="IIW" rel="nofollow" href="https://internetidentityworkshop.com/">IIW</a> &mdash; The Internet Identity Workshop has been finding, probing and solving identity issues twice every year since 2005. We meet in the Computer History Museum in Mountain View, CA. Every IIW moves topics, code and projects downfield. Name an identity topic and it’s likely that more substantial discussion and work has been done at IIW than any other conference!</li><li><a title="Merkle tree - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Merkle_tree">Merkle tree - Wikipedia</a> &mdash; In cryptography and computer science, a hash tree or Merkle tree is a tree in which every leaf node is labelled with the cryptographic hash of a data block, and every non-leaf node is labelled with the cryptographic hash of the labels of its child nodes. Hash trees allow efficient and secure verification of the contents of large data structures. Hash trees are a generalization of hash lists and hash chains.</li><li><a title="A Declaration of the Independence of Cyberspace | Electronic Frontier Foundation" rel="nofollow" href="https://www.eff.org/cyberspace-independence">A Declaration of the Independence of Cyberspace | Electronic Frontier Foundation</a> &mdash; Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 51: Poop in the Desert</title>
  <link>https://www.reality2cast.com/51</link>
  <guid isPermaLink="false">ef739930-4fab-41c5-98d3-ee5da908228b</guid>
  <pubDate>Fri, 11 Dec 2020 08:00:00 -0500</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/ef739930-4fab-41c5-98d3-ee5da908228b.mp3" length="33802180" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Doc Searls and Katherine Druckman have a fun chat with Petros Koutoupis about open source in space, digital detox, World War 2 cryptography, and poop in the desert.</itunes:subtitle>
  <itunes:duration>40:13</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>Doc Searls and Katherine Druckman have a fun chat with Petros Koutoupis about open source in space, digital detox, World War 2 cryptography, and poop in the desert.
Reality 2.0 around the web:
Site/Blog/Newsletter (https://www.reality2cast.com)
FaceBook (https://www.facebook.com/reality2cast)
Twitter (https://twitter.com/reality2cast)
YouTube (https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q)
Mastodon (https://linuxrocks.online/@reality2cast) Special Guest: Petros Koutoupis.
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><em>Doc Searls and Katherine Druckman have a fun chat with Petros Koutoupis about open source in space, digital detox, World War 2 cryptography, and poop in the desert.</em></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Petros Koutoupis.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="NASA is paying startups for moon rocks. It&#39;s not what you think - CNN" rel="nofollow" href="https://www.cnn.com/2020/12/04/tech/nasa-moon-resource-mining-artemis-scn/index.html">NASA is paying startups for moon rocks. It's not what you think - CNN</a> &mdash; NASA pledged in September to buy moon rocks from companies that can get robotic rovers to the lunar surface and scoop up samples of the dusty terrain, and the space agency asked for bids from companies all over the world. The winners were unveiled Thursday: California-based Masten, Lunar Outpost of Colorado, and two separate companies that are both called iSpace — one from Japan and the other from Luxembourg.</li><li><a title="semissioncontrol/semcos: SEMC OS is an operating system for Space Exploration and beyond!" rel="nofollow" href="https://github.com/semissioncontrol/semcos">semissioncontrol/semcos: SEMC OS is an operating system for Space Exploration and beyond!</a> &mdash; Space. The Final Frontier. Where man hesitates to go, for it is one of the most dangerous realms that can be found. Not a world, but a multitude of worlds, accessible through only one tool — the space rocket. But tools of great power rely on systems of even more tremendously large strength. These systems are the ones that are created here, at SEMC. The Space Exploration Mission Control organization strives to create powerful tools and services, Open Sourced.

And this is SEMC OS. A from-scratch distro written to be fast and reliable. Why? Because large space agencies lack one. There should be a unification when it comes to softwares that control the future of humanity - and this is where SEMC OS comes in. Hooked? Read on!

</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><em>Doc Searls and Katherine Druckman have a fun chat with Petros Koutoupis about open source in space, digital detox, World War 2 cryptography, and poop in the desert.</em></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Petros Koutoupis.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="NASA is paying startups for moon rocks. It&#39;s not what you think - CNN" rel="nofollow" href="https://www.cnn.com/2020/12/04/tech/nasa-moon-resource-mining-artemis-scn/index.html">NASA is paying startups for moon rocks. It's not what you think - CNN</a> &mdash; NASA pledged in September to buy moon rocks from companies that can get robotic rovers to the lunar surface and scoop up samples of the dusty terrain, and the space agency asked for bids from companies all over the world. The winners were unveiled Thursday: California-based Masten, Lunar Outpost of Colorado, and two separate companies that are both called iSpace — one from Japan and the other from Luxembourg.</li><li><a title="semissioncontrol/semcos: SEMC OS is an operating system for Space Exploration and beyond!" rel="nofollow" href="https://github.com/semissioncontrol/semcos">semissioncontrol/semcos: SEMC OS is an operating system for Space Exploration and beyond!</a> &mdash; Space. The Final Frontier. Where man hesitates to go, for it is one of the most dangerous realms that can be found. Not a world, but a multitude of worlds, accessible through only one tool — the space rocket. But tools of great power rely on systems of even more tremendously large strength. These systems are the ones that are created here, at SEMC. The Space Exploration Mission Control organization strives to create powerful tools and services, Open Sourced.

And this is SEMC OS. A from-scratch distro written to be fast and reliable. Why? Because large space agencies lack one. There should be a unification when it comes to softwares that control the future of humanity - and this is where SEMC OS comes in. Hooked? Read on!

</li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
