<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Thu, 30 Apr 2026 04:54:53 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Reality 2.0 - Episodes Tagged with “Identity”</title>
    <link>https://www.reality2cast.com/tags/identity</link>
    <pubDate>Wed, 01 Mar 2023 07:00:00 -0500</pubDate>
    <description>Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as  Linux and open source and other current issues.
</description>
    <language>en</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Where tech meets reality. Navigating technology, privacy, security and open source. </itunes:subtitle>
    <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
    <itunes:summary>Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as  Linux and open source and other current issues.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>technology, privacy, open source, linux, security, cybersecurity, infosec, FOSS, FLOSS</itunes:keywords>
    <itunes:owner>
      <itunes:name>Katherine Druckman and Doc Searls</itunes:name>
      <itunes:email>podcast@reality2cast.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<item>
  <title>Episode 141: User Sovereignty and Authenticity in Commerce</title>
  <link>https://www.reality2cast.com/141</link>
  <guid isPermaLink="false">572867c2-c2dc-422e-b7b2-7c47f5dc6826</guid>
  <pubDate>Wed, 01 Mar 2023 07:00:00 -0500</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/572867c2-c2dc-422e-b7b2-7c47f5dc6826.mp3" length="45837720" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls hear Dave Huseby's new ideas about identity verification and data authenticity in commerce.</itunes:subtitle>
  <itunes:duration>54:57</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>Katherine Druckman and Doc Searls hear Dave Huseby's new ideas about identity verification and data authenticity in commerce.
Site/Blog/Newsletter (https://www.reality2cast.com)
FaceBook (https://www.facebook.com/reality2cast)
Twitter (https://twitter.com/reality2cast)
Mastodon (https://linuxrocks.online/@reality2cast) Special Guest: Dave Huseby.
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls hear Dave Huseby&#39;s new ideas about identity verification and data authenticity in commerce.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Dave Huseby.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Cryptid Technologies" rel="nofollow" href="https://www.cryptid.tech/">Cryptid Technologies</a> &mdash; Necessary Security at Unprecedented Scale
We offer flexible APIs for building zero-knowledge proof based authentication and authorization, authenticated provenance, verifiable authenticity, and privacy preserving decentralized identity that scales to billions of people and devices.</li><li><a title="IIW" rel="nofollow" href="https://internetidentityworkshop.com/">IIW</a> &mdash; The Internet Identity Workshop has been finding, probing and solving identity issues twice every year since 2005. We meet in the Computer History Museum in Mountain View, CA. Every IIW moves topics, code and projects downfield. Name an identity topic and it’s likely that more substantial discussion and work has been done at IIW than any other conference!</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls hear Dave Huseby&#39;s new ideas about identity verification and data authenticity in commerce.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Dave Huseby.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Cryptid Technologies" rel="nofollow" href="https://www.cryptid.tech/">Cryptid Technologies</a> &mdash; Necessary Security at Unprecedented Scale
We offer flexible APIs for building zero-knowledge proof based authentication and authorization, authenticated provenance, verifiable authenticity, and privacy preserving decentralized identity that scales to billions of people and devices.</li><li><a title="IIW" rel="nofollow" href="https://internetidentityworkshop.com/">IIW</a> &mdash; The Internet Identity Workshop has been finding, probing and solving identity issues twice every year since 2005. We meet in the Computer History Museum in Mountain View, CA. Every IIW moves topics, code and projects downfield. Name an identity topic and it’s likely that more substantial discussion and work has been done at IIW than any other conference!</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 133: Hardware Supply Chains, Trust Agility, and Avoiding Vendor Lock-in</title>
  <link>https://www.reality2cast.com/133</link>
  <guid isPermaLink="false">042947a0-05c1-4ef0-b935-550032f203cb</guid>
  <pubDate>Tue, 06 Dec 2022 07:00:00 -0500</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/042947a0-05c1-4ef0-b935-550032f203cb.mp3" length="65468783" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Doc Searls and Katherine Druckman talk to Kyle Rankin about hardware supply chains, building the only USA-made mobile phone, trust, open standards, and much more.</itunes:subtitle>
  <itunes:duration>1:08:35</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>Doc Searls and Katherine Druckman talk to Kyle Rankin about hardware supply chains, building the only USA-made mobile phone, trust, open standards, and much more.
Site/Blog/Newsletter (https://www.reality2cast.com)
FaceBook (https://www.facebook.com/reality2cast)
Twitter (https://twitter.com/reality2cast)
Mastodon (https://linuxrocks.online/@reality2cast) Special Guest: Kyle Rankin.
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Kyle Rankin about hardware supply chains, building the only USA-made mobile phone, trust, open standards, and much more.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Why The U.S. Fell Behind In Phone Manufacturing - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=YdbA7Z8Ae4w">Why The U.S. Fell Behind In Phone Manufacturing - YouTube</a></li><li><a title="JMP: Your phone number on every device" rel="nofollow" href="https://jmp.chat/">JMP: Your phone number on every device</a></li><li><a title="IIW" rel="nofollow" href="https://internetidentityworkshop.com/">IIW</a></li><li><a title="Reality 2.0 on Mastodon" rel="nofollow" href="https://reality2.social/@realty2cast">Reality 2.0 on Mastodon</a></li><li><a title="Explore - Texas Observer Social" rel="nofollow" href="https://texasobserver.social/explore">Explore - Texas Observer Social</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Kyle Rankin about hardware supply chains, building the only USA-made mobile phone, trust, open standards, and much more.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Why The U.S. Fell Behind In Phone Manufacturing - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=YdbA7Z8Ae4w">Why The U.S. Fell Behind In Phone Manufacturing - YouTube</a></li><li><a title="JMP: Your phone number on every device" rel="nofollow" href="https://jmp.chat/">JMP: Your phone number on every device</a></li><li><a title="IIW" rel="nofollow" href="https://internetidentityworkshop.com/">IIW</a></li><li><a title="Reality 2.0 on Mastodon" rel="nofollow" href="https://reality2.social/@realty2cast">Reality 2.0 on Mastodon</a></li><li><a title="Explore - Texas Observer Social" rel="nofollow" href="https://texasobserver.social/explore">Explore - Texas Observer Social</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 131: Digital Wallets</title>
  <link>https://www.reality2cast.com/131</link>
  <guid isPermaLink="false">9645464e-fdae-4e36-8f7b-cdd633db4f08</guid>
  <pubDate>Sat, 05 Nov 2022 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/9645464e-fdae-4e36-8f7b-cdd633db4f08.mp3" length="55069116" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman, Doc Searls, and Petros Koutoupis talk digital wallets and current events.</itunes:subtitle>
  <itunes:duration>53:47</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>Katherine Druckman, Doc Searls, and Petros Koutoupis talk digital wallets and current events.
Site/Blog/Newsletter (https://www.reality2cast.com)
FaceBook (https://www.facebook.com/reality2cast)
Twitter (https://twitter.com/reality2cast)
Mastodon (https://linuxrocks.online/@reality2cast) Special Guest: Petros Koutoupis.
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman, Doc Searls, and Petros Koutoupis talk digital wallets and current events.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Petros Koutoupis.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="The digital wallet will be the biggest instrument of personal agency since the browser—but only if we make it ours" rel="nofollow" href="https://reality2.substack.com/p/the-digital-wallet-will-be-the-biggest">The digital wallet will be the biggest instrument of personal agency since the browser—but only if we make it ours</a> &mdash; Apple and Google already have a wallet in your phone. Other developers want an open way to build alternatives. But the missing player in this is us. Let's step up.</li><li><a title="Podcasts Killed the Radio Star - by Katherine Druckman" rel="nofollow" href="https://reality2.substack.com/p/podcasts-killed-the-radio-star">Podcasts Killed the Radio Star - by Katherine Druckman</a> &mdash; As many of our listeners already know, podcasting originated with an idea to add enclosures to an RSS feed. After much lobbying from former MTV personality Adam Curry, Dave Winer, creator of the RSS format, famously updated RSS version 0.92 in 2001 with the addition of an  tag, and while it took a few years to catch on with widespread adoption thanks largely to the Apple iPod, the rest, as they say, is history.</li><li><a title="VRM Day 2022b Tickets, Mon, Nov 14, 2022 at 9:00 AM | Eventbrite" rel="nofollow" href="https://www.eventbrite.com/e/vrm-day-2022b-tickets-432694610227">VRM Day 2022b Tickets, Mon, Nov 14, 2022 at 9:00 AM | Eventbrite</a> &mdash; T﻿his VRM Day will also host the November salon in the Ostrom Workshop's Beyond the Web series, hosted by Doc Searls and starring Roger McNamee. Respected for decades as an investor, musician, tech guru, philanthropist, and mentor to entrepreneurs—most notably Mark Zuckerberg of Facebook—Roger has made big waves recently with his bestselling book, Zucked: Waking Up to the Facebook Catastrophe</li><li><a title="Elon Musk’s Twitter Layoffs Are Brewing Up a Perfect Storm for the Midterms | Vanity Fair" rel="nofollow" href="https://www.vanityfair.com/news/2022/11/elon-musk-twitter-storm-midterms">Elon Musk’s Twitter Layoffs Are Brewing Up a Perfect Storm for the Midterms | Vanity Fair</a> &mdash; Misinformation experts are sounding alarms as the tech billionaire sets out to reportedly axe half the company’s workforce and blow up its blue-check verification system ahead of Election Day. “Comms has gone dark,” one reporter tweeted. “To say I’m worried for next week’s election doesn’t even begin to cover it.”</li><li><a title="IIW" rel="nofollow" href="https://internetidentityworkshop.com/">IIW</a> &mdash; The Internet Identity Workshop has been finding, probing and solving identity issues twice every year since 2005. We meet in the Computer History Museum in Mountain View, CA. Every IIW moves topics, code and projects downfield. Name an identity topic and it’s likely that more substantial discussion and work has been done at IIW than any other conference!</li><li><a title="EmanciPay - Project VRM" rel="nofollow" href="https://cyber.harvard.edu/projectvrm/EmanciPay">EmanciPay - Project VRM</a> &mdash; Simply put, Emancipay makes it easy for anybody to pay (or offer to pay) —

as much as they like
however they like
for whatever they like
on their own terms
— or at least to start with that full set of options, and to work out differences with sellers easily and with minimal friction.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman, Doc Searls, and Petros Koutoupis talk digital wallets and current events.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Petros Koutoupis.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="The digital wallet will be the biggest instrument of personal agency since the browser—but only if we make it ours" rel="nofollow" href="https://reality2.substack.com/p/the-digital-wallet-will-be-the-biggest">The digital wallet will be the biggest instrument of personal agency since the browser—but only if we make it ours</a> &mdash; Apple and Google already have a wallet in your phone. Other developers want an open way to build alternatives. But the missing player in this is us. Let's step up.</li><li><a title="Podcasts Killed the Radio Star - by Katherine Druckman" rel="nofollow" href="https://reality2.substack.com/p/podcasts-killed-the-radio-star">Podcasts Killed the Radio Star - by Katherine Druckman</a> &mdash; As many of our listeners already know, podcasting originated with an idea to add enclosures to an RSS feed. After much lobbying from former MTV personality Adam Curry, Dave Winer, creator of the RSS format, famously updated RSS version 0.92 in 2001 with the addition of an  tag, and while it took a few years to catch on with widespread adoption thanks largely to the Apple iPod, the rest, as they say, is history.</li><li><a title="VRM Day 2022b Tickets, Mon, Nov 14, 2022 at 9:00 AM | Eventbrite" rel="nofollow" href="https://www.eventbrite.com/e/vrm-day-2022b-tickets-432694610227">VRM Day 2022b Tickets, Mon, Nov 14, 2022 at 9:00 AM | Eventbrite</a> &mdash; T﻿his VRM Day will also host the November salon in the Ostrom Workshop's Beyond the Web series, hosted by Doc Searls and starring Roger McNamee. Respected for decades as an investor, musician, tech guru, philanthropist, and mentor to entrepreneurs—most notably Mark Zuckerberg of Facebook—Roger has made big waves recently with his bestselling book, Zucked: Waking Up to the Facebook Catastrophe</li><li><a title="Elon Musk’s Twitter Layoffs Are Brewing Up a Perfect Storm for the Midterms | Vanity Fair" rel="nofollow" href="https://www.vanityfair.com/news/2022/11/elon-musk-twitter-storm-midterms">Elon Musk’s Twitter Layoffs Are Brewing Up a Perfect Storm for the Midterms | Vanity Fair</a> &mdash; Misinformation experts are sounding alarms as the tech billionaire sets out to reportedly axe half the company’s workforce and blow up its blue-check verification system ahead of Election Day. “Comms has gone dark,” one reporter tweeted. “To say I’m worried for next week’s election doesn’t even begin to cover it.”</li><li><a title="IIW" rel="nofollow" href="https://internetidentityworkshop.com/">IIW</a> &mdash; The Internet Identity Workshop has been finding, probing and solving identity issues twice every year since 2005. We meet in the Computer History Museum in Mountain View, CA. Every IIW moves topics, code and projects downfield. Name an identity topic and it’s likely that more substantial discussion and work has been done at IIW than any other conference!</li><li><a title="EmanciPay - Project VRM" rel="nofollow" href="https://cyber.harvard.edu/projectvrm/EmanciPay">EmanciPay - Project VRM</a> &mdash; Simply put, Emancipay makes it easy for anybody to pay (or offer to pay) —

as much as they like
however they like
for whatever they like
on their own terms
— or at least to start with that full set of options, and to work out differences with sellers easily and with minimal friction.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 117: Thrivacy</title>
  <link>https://www.reality2cast.com/117</link>
  <guid isPermaLink="false">8e5f7418-efb1-4392-98fe-f8128bc2ddd2</guid>
  <pubDate>Fri, 08 Jul 2022 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/8e5f7418-efb1-4392-98fe-f8128bc2ddd2.mp3" length="39176106" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Doc Searls and Katherine Druckman talk to Gordon Jones and Erica Barnette about Thrivacy, their new digital wallet for private, verifiable credentials.</itunes:subtitle>
  <itunes:duration>49:12</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>Doc Searls and Katherine Druckman talk to Gordon Jones and Erica Barnette about Thrivacy, their new digital wallet for private, verifiable credentials.
Site/Blog/Newsletter (https://www.reality2cast.com)
FaceBook (https://www.facebook.com/reality2cast)
Twitter (https://twitter.com/reality2cast)
YouTube (https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q)
Mastodon (https://linuxrocks.online/@reality2cast) Special Guests: Erica Barnette and Gordon Jones.
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, decentralization, identity</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Gordon Jones and Erica Barnette about Thrivacy, their new digital wallet for private, verifiable credentials.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Erica Barnette and Gordon Jones.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Understanding DIDComm. A cross-community effort to standardize… | by Kaliya-IdentityWoman | Decentralized Identity Foundation | Medium" rel="nofollow" href="https://medium.com/decentralized-identity/understanding-didcomm-14da547ca36b">Understanding DIDComm. A cross-community effort to standardize… | by Kaliya-IdentityWoman | Decentralized Identity Foundation | Medium</a> &mdash; If you are reading this, you probably know already what Decentralized Identifiers (DID) are: they are “identifiers” or addresses which can be queried to return some information about the subject represented. The addresses take the form of a long, opaque “string” (a long block of letters and numbers, in this case of a fixed length), and the DID “documents” that get returned when they are queried contain some cryptographic key material and, depending on the particularities of the returning system, maybe a few other pieces of information or addresses.</li><li><a title="Decentralized identifier - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Decentralized_identifier">Decentralized identifier - Wikipedia</a> &mdash; Decentralized identifiers are a type of identifier that enables a verifiable, decentralized digital identity.[1][2] They are an important component of decentralized web applications.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Gordon Jones and Erica Barnette about Thrivacy, their new digital wallet for private, verifiable credentials.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Erica Barnette and Gordon Jones.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Understanding DIDComm. A cross-community effort to standardize… | by Kaliya-IdentityWoman | Decentralized Identity Foundation | Medium" rel="nofollow" href="https://medium.com/decentralized-identity/understanding-didcomm-14da547ca36b">Understanding DIDComm. A cross-community effort to standardize… | by Kaliya-IdentityWoman | Decentralized Identity Foundation | Medium</a> &mdash; If you are reading this, you probably know already what Decentralized Identifiers (DID) are: they are “identifiers” or addresses which can be queried to return some information about the subject represented. The addresses take the form of a long, opaque “string” (a long block of letters and numbers, in this case of a fixed length), and the DID “documents” that get returned when they are queried contain some cryptographic key material and, depending on the particularities of the returning system, maybe a few other pieces of information or addresses.</li><li><a title="Decentralized identifier - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Decentralized_identifier">Decentralized identifier - Wikipedia</a> &mdash; Decentralized identifiers are a type of identifier that enables a verifiable, decentralized digital identity.[1][2] They are an important component of decentralized web applications.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 113: Authentic Users and Data</title>
  <link>https://www.reality2cast.com/113</link>
  <guid isPermaLink="false">05da0bba-9307-442e-aaa0-478afbed3989</guid>
  <pubDate>Fri, 27 May 2022 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/05da0bba-9307-442e-aaa0-478afbed3989.mp3" length="61461946" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Doc Searls and Katherine Druckman talk to Dave Huseby of Cryptid.tech about pseudonymous authentication and verifiable data.</itunes:subtitle>
  <itunes:duration>1:18:53</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>Doc Searls and Katherine Druckman talk to Dave Huseby of Cryptid.tech about pseudonymous authentication and verifiable data.
Site/Blog/Newsletter (https://www.reality2cast.com)
FaceBook (https://www.facebook.com/reality2cast)
Twitter (https://twitter.com/reality2cast)
YouTube (https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q)
Mastodon (https://linuxrocks.online/@reality2cast) Special Guest: Dave Huseby.
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Dave Huseby of Cryptid.tech about pseudonymous authentication and verifiable data.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Dave Huseby.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Reality 2.0 Episode 112: Pseudonymous Authentication for Twitter" rel="nofollow" href="https://www.reality2cast.com/112">Reality 2.0 Episode 112: Pseudonymous Authentication for Twitter</a> &mdash; Katherine Druckman and Kyle Rankin talk to Dave Huseby about his new approach to pseudonymous user authentication.</li><li><a title="Reality 2.0 Episode 61: The Future of Authenticating Your Data" rel="nofollow" href="https://www.reality2cast.com/61">Reality 2.0 Episode 61: The Future of Authenticating Your Data</a> &mdash; Katherine Druckman and Doc Searls talk to Dave Huseby about the authentic data economy, and the future of authentication.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Dave Huseby of Cryptid.tech about pseudonymous authentication and verifiable data.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Dave Huseby.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Reality 2.0 Episode 112: Pseudonymous Authentication for Twitter" rel="nofollow" href="https://www.reality2cast.com/112">Reality 2.0 Episode 112: Pseudonymous Authentication for Twitter</a> &mdash; Katherine Druckman and Kyle Rankin talk to Dave Huseby about his new approach to pseudonymous user authentication.</li><li><a title="Reality 2.0 Episode 61: The Future of Authenticating Your Data" rel="nofollow" href="https://www.reality2cast.com/61">Reality 2.0 Episode 61: The Future of Authenticating Your Data</a> &mdash; Katherine Druckman and Doc Searls talk to Dave Huseby about the authentic data economy, and the future of authentication.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 112: Pseudonymous Authentication for Twitter</title>
  <link>https://www.reality2cast.com/112</link>
  <guid isPermaLink="false">b77937b6-289a-4961-90d0-8bb966aec39b</guid>
  <pubDate>Fri, 20 May 2022 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/b77937b6-289a-4961-90d0-8bb966aec39b.mp3" length="66643224" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Kyle Rankin talk to Dave Huseby about his new approach to pseudonymous user authentication.</itunes:subtitle>
  <itunes:duration>1:29:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>Katherine Druckman and Kyle Rankin talk to Dave Huseby about his new approach to pseudonymous user authentication.
Site/Blog/Newsletter (https://www.reality2cast.com)
FaceBook (https://www.facebook.com/reality2cast)
Twitter (https://twitter.com/reality2cast)
YouTube (https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q)
Mastodon (https://linuxrocks.online/@reality2cast) Special Guests: Dave Huseby and Kyle Rankin.
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Kyle Rankin talk to Dave Huseby about his new approach to pseudonymous user authentication.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Dave Huseby and Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Authentication With Pseudonymity - Cryptid Technologies" rel="nofollow" href="https://www.cryptid.tech/post/authentication-with-pseudonymity">Authentication With Pseudonymity - Cryptid Technologies</a> &mdash; Authentication With Pseudonymity
How Elon can Legally Transform Twitter with Pseudonymous Free Speech
by Dave Huseby

“Authentication is important, but so is anonymity for many. A balance must be struck.” — Elon Musk (@elonmusk)
In a well-studied and famous letter dated October 17, 1788 from James Madison to Thomas Jefferson, Madison discusses the proposed Bill of Rights and his plan for getting it passed in the first session of Congress. One fact that many do not know is that the letter is encrypted in part using a cipher invented by Thomas Jefferson. In the letter, Madison details the bitter and extremely contentious politics among the states, especially between the prominent Anti-Federalists and the Federalists like themselves. Madison’s chief concern was passing the Bill of Rights to quell any organized opposition to the Constitution. Political persecution was rampant and serious enough that Madison and Jefferson made careful use of encryption to avoid being doxxed and canceled because of their private political opinions.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Kyle Rankin talk to Dave Huseby about his new approach to pseudonymous user authentication.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Dave Huseby and Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Authentication With Pseudonymity - Cryptid Technologies" rel="nofollow" href="https://www.cryptid.tech/post/authentication-with-pseudonymity">Authentication With Pseudonymity - Cryptid Technologies</a> &mdash; Authentication With Pseudonymity
How Elon can Legally Transform Twitter with Pseudonymous Free Speech
by Dave Huseby

“Authentication is important, but so is anonymity for many. A balance must be struck.” — Elon Musk (@elonmusk)
In a well-studied and famous letter dated October 17, 1788 from James Madison to Thomas Jefferson, Madison discusses the proposed Bill of Rights and his plan for getting it passed in the first session of Congress. One fact that many do not know is that the letter is encrypted in part using a cipher invented by Thomas Jefferson. In the letter, Madison details the bitter and extremely contentious politics among the states, especially between the prominent Anti-Federalists and the Federalists like themselves. Madison’s chief concern was passing the Bill of Rights to quell any organized opposition to the Constitution. Political persecution was rampant and serious enough that Madison and Jefferson made careful use of encryption to avoid being doxxed and canceled because of their private political opinions.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 107: Building the Decentralized Web</title>
  <link>https://www.reality2cast.com/107</link>
  <guid isPermaLink="false">df1c3f08-3690-4e29-8ab6-adff68956c8a</guid>
  <pubDate>Fri, 15 Apr 2022 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/df1c3f08-3690-4e29-8ab6-adff68956c8a.mp3" length="58510457" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls talk to James Walker of Fission about building the decentralized web, decentralized identity, IPFS, and empowering users.</itunes:subtitle>
  <itunes:duration>1:13:53</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>Katherine Druckman and Doc Searls talk to James Walker of Fission about building the decentralized web, decentralized identity, IPFS, and empowering users.
Site/Blog/Newsletter (https://www.reality2cast.com)
FaceBook (https://www.facebook.com/reality2cast)
Twitter (https://twitter.com/reality2cast)
YouTube (https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q)
Mastodon (https://linuxrocks.online/@reality2cast) Special Guest: James Walker.
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, identity, decentralized web</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to James Walker of Fission about building the decentralized web, decentralized identity, IPFS, and empowering users.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: James Walker.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Build the future of web apps at the edge – Fission" rel="nofollow" href="https://fission.codes/">Build the future of web apps at the edge – Fission</a> &mdash; Cloud native stacks won't deliver the future
We're building the data, auth &amp; compute primitives that enable true local-first edge applications. But we don’t get to the future alone. Our edge computing stack is already embedded into leading protocols, platforms and products.</li><li><a title="Beyond the Web. Answer these questions: | by Doc Searls | Mar, 2022 | Medium" rel="nofollow" href="https://dsearls.medium.com/beyond-the-web-b33518312876">Beyond the Web. Answer these questions: | by Doc Searls | Mar, 2022 | Medium</a> &mdash; Why are the choices presented to you by websites called your choices, when all those choices are provided by them? And why don’t you give them choices?</li><li><a title="Elon Musk offers to buy Twitter. Here&#39;s what we know | AP News" rel="nofollow" href="https://apnews.com/article/elon-musk-twitter-offer-92fe6980cbcfdedea43637ac336c367a">Elon Musk offers to buy Twitter. Here's what we know | AP News</a> &mdash; In 10 days, Tesla CEO Elon Musk has gone from popular Twitter contributor and critic to the company’s largest individual shareholder to a would-be owner of the social platform — a whirlwind of activity that could change the service dramatically given the sometimes whimsical billionaire’s self-identification as a free-speech absolutist.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to James Walker of Fission about building the decentralized web, decentralized identity, IPFS, and empowering users.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: James Walker.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Build the future of web apps at the edge – Fission" rel="nofollow" href="https://fission.codes/">Build the future of web apps at the edge – Fission</a> &mdash; Cloud native stacks won't deliver the future
We're building the data, auth &amp; compute primitives that enable true local-first edge applications. But we don’t get to the future alone. Our edge computing stack is already embedded into leading protocols, platforms and products.</li><li><a title="Beyond the Web. Answer these questions: | by Doc Searls | Mar, 2022 | Medium" rel="nofollow" href="https://dsearls.medium.com/beyond-the-web-b33518312876">Beyond the Web. Answer these questions: | by Doc Searls | Mar, 2022 | Medium</a> &mdash; Why are the choices presented to you by websites called your choices, when all those choices are provided by them? And why don’t you give them choices?</li><li><a title="Elon Musk offers to buy Twitter. Here&#39;s what we know | AP News" rel="nofollow" href="https://apnews.com/article/elon-musk-twitter-offer-92fe6980cbcfdedea43637ac336c367a">Elon Musk offers to buy Twitter. Here's what we know | AP News</a> &mdash; In 10 days, Tesla CEO Elon Musk has gone from popular Twitter contributor and critic to the company’s largest individual shareholder to a would-be owner of the social platform — a whirlwind of activity that could change the service dramatically given the sometimes whimsical billionaire’s self-identification as a free-speech absolutist.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 99: IdRamp and Identity Solutions</title>
  <link>https://www.reality2cast.com/99</link>
  <guid isPermaLink="false">1f61c542-84fc-4fd5-a2d7-fd789126edc3</guid>
  <pubDate>Fri, 18 Feb 2022 07:00:00 -0500</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/1f61c542-84fc-4fd5-a2d7-fd789126edc3.mp3" length="45373990" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Doc Searls and Katherine Druckman talk to Mike Vesey, CEO of IdRamp, about verifiable credentials, decentralization, and real-world identity solutions.</itunes:subtitle>
  <itunes:duration>54:53</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>Doc Searls and Katherine Druckman talk to Mike Vesey, CEO of IdRamp, about verifiable credentials, decentralization, and real-world identity solutions.
Reality 2.0 around the web:
Site/Blog/Newsletter (https://www.reality2cast.com)
FaceBook (https://www.facebook.com/reality2cast)
Twitter (https://twitter.com/reality2cast)
YouTube (https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q)
Mastodon (https://linuxrocks.online/@reality2cast) Special Guest: Mike Vesey.
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, identity management, self-sovereign identity</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Mike Vesey, CEO of IdRamp, about verifiable credentials, decentralization, and real-world identity solutions.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Mike Vesey.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="IdRamp Decentralized Identity Services" rel="nofollow" href="https://idramp.com/">IdRamp Decentralized Identity Services</a></li><li><a title="IIW" rel="nofollow" href="https://internetidentityworkshop.com/">IIW</a></li><li><a title="Reality 2.0 Episode 97: ID.me Vs. The Alternatives" rel="nofollow" href="https://www.reality2cast.com/97">Reality 2.0 Episode 97: ID.me Vs. The Alternatives</a> &mdash; Doc Searls and Katherine Druckman talk to Kaliya Young of the Internet Identity Workshop about ID.me, our concerns about its use as a national ID, and potential alternatives.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Mike Vesey, CEO of IdRamp, about verifiable credentials, decentralization, and real-world identity solutions.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Mike Vesey.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="IdRamp Decentralized Identity Services" rel="nofollow" href="https://idramp.com/">IdRamp Decentralized Identity Services</a></li><li><a title="IIW" rel="nofollow" href="https://internetidentityworkshop.com/">IIW</a></li><li><a title="Reality 2.0 Episode 97: ID.me Vs. The Alternatives" rel="nofollow" href="https://www.reality2cast.com/97">Reality 2.0 Episode 97: ID.me Vs. The Alternatives</a> &mdash; Doc Searls and Katherine Druckman talk to Kaliya Young of the Internet Identity Workshop about ID.me, our concerns about its use as a national ID, and potential alternatives.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 97: ID.me Vs. The Alternatives</title>
  <link>https://www.reality2cast.com/97</link>
  <guid isPermaLink="false">9029e7a2-68eb-44f9-b189-a3df31bd8794</guid>
  <pubDate>Fri, 28 Jan 2022 07:00:00 -0500</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/9029e7a2-68eb-44f9-b189-a3df31bd8794.mp3" length="46329728" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Doc Searls and Katherine Druckman talk to Kaliya Young of the Internet Identity Workshop about ID.me, our concerns about its use as a national ID, and potential alternatives.</itunes:subtitle>
  <itunes:duration>59:51</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>Doc Searls and Katherine Druckman talk to Kaliya Young of the Internet Identity Workshop about ID.me, our concerns about its use as a national ID, and potential alternatives.
Reality 2.0 around the web:
Site/Blog/Newsletter (https://www.reality2cast.com)
FaceBook (https://www.facebook.com/reality2cast)
Twitter (https://twitter.com/reality2cast)
YouTube (https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q)
Mastodon (https://linuxrocks.online/@reality2cast) Special Guest: Kaliya Young.
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, identity</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Kaliya Young of the Internet Identity Workshop about ID.me, our concerns about its use as a national ID, and potential alternatives.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Kaliya Young.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Cybersecurity Company ID.me Is Becoming Government’s Digital Gatekeeper - Bloomberg" rel="nofollow" href="https://www.bloomberg.com/news/features/2022-01-20/cybersecurity-company-id-me-is-becoming-government-s-digital-gatekeeper">Cybersecurity Company ID.me Is Becoming Government’s Digital Gatekeeper - Bloomberg</a> &mdash; Military veteran Blake Hall’s cybersecurity company has become the government’s digital gatekeeper. Its unproven estimate—$400 billion in pandemic unemployment fraud—is also very good for its business.</li><li><a title="ID.me CEO apologizes for misstatements on IRS facial recognition - Axios" rel="nofollow" href="https://www.axios.com/idme-ceo-apologizes-misstatements-irs-facial-recognition-88ce2ee2-9ae9-426c-b69e-c0b42ad82f61.html">ID.me CEO apologizes for misstatements on IRS facial recognition - Axios</a> &mdash; The CEO of ID.me apologized Wednesday for mischaracterizing the facial recognition system the company uses to verify people's identity.</li><li><a title="Homepage - Identity Woman" rel="nofollow" href="https://identitywoman.net/">Homepage - Identity Woman</a> &mdash; Shape your impact with[in]
Digital Identity</li><li><a title="Sovereign Identity Updates | Substack" rel="nofollow" href="https://newsletter.identosphere.net/">Sovereign Identity Updates | Substack</a></li><li><a title="The Domains of Identity: A Framework for Understanding Identity Systems in Contemporary Society (Anthem Impact): Young, Kaliya: 9781785274916: Amazon.com: Books" rel="nofollow" href="https://www.amazon.com/Domains-Identity-Understanding-Contemporary-Collection/dp/1785274910">The Domains of Identity: A Framework for Understanding Identity Systems in Contemporary Society (Anthem Impact): Young, Kaliya: 9781785274916: Amazon.com: Books</a> &mdash; The Domains of Identity” defines sixteen simple and comprehensive categories of interactions which cause personally identifiable information to be stored in databases. This research, which builds on the synthesis of over 900 academic articles, addresses the challenges of identity management that involve interactions of almost all people in almost all institutional/organizational contexts. Enumerating the sixteen domains and describing the characteristics of each domain clarifies which problems can arise and how they can be solved within each domain.

</li><li><a title="Anil John - Technical Director and Silicon Valley Innovation Program @ U.S. Department of Homeland Security - Crunchbase Person Profile" rel="nofollow" href="https://www.crunchbase.com/person/anil-john">Anil John - Technical Director and Silicon Valley Innovation Program @ U.S. Department of Homeland Security - Crunchbase Person Profile</a></li><li><a title="SVIP | Homeland Security" rel="nofollow" href="https://www.dhs.gov/science-and-technology/svip">SVIP | Homeland Security</a> &mdash; The Department of Homeland Security (DHS) Science and Technology Directorate (S&amp;T) Silicon Valley Innovation Program (SVIP) is keeping pace with the innovation community to tackle the hardest problems faced by DHS and the Homeland Security Enterprise. </li><li><a title="The Thoughtful Biometrics Workshop 2022 · Thoughtful Biometrics" rel="nofollow" href="https://thoughtfulbiometrics.org/">The Thoughtful Biometrics Workshop 2022 · Thoughtful Biometrics</a> &mdash; The Thoughtful Biometrics Workshop is creating a space to dialogue about critical emerging issues surrounding biometric and digital identity technologies.</li><li><a title="European Digital Identity | European Commission" rel="nofollow" href="https://ec.europa.eu/info/strategy/priorities-2019-2024/europe-fit-digital-age/european-digital-identity_en">European Digital Identity | European Commission</a> &mdash; The European Digital Identity will be available to EU citizens, residents, and businesses who want to identify themselves or provide confirmation of certain personal information. It can be used for both online and offline public and private services across the EU.

</li><li><a title="The Hymn of Acxiom - Transcription - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=F7P2ViCRObs">The Hymn of Acxiom - Transcription - YouTube</a></li><li><a title="The Hymn of Acxiom - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=QF-7WiLykGM">The Hymn of Acxiom - YouTube</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Kaliya Young of the Internet Identity Workshop about ID.me, our concerns about its use as a national ID, and potential alternatives.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Kaliya Young.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Cybersecurity Company ID.me Is Becoming Government’s Digital Gatekeeper - Bloomberg" rel="nofollow" href="https://www.bloomberg.com/news/features/2022-01-20/cybersecurity-company-id-me-is-becoming-government-s-digital-gatekeeper">Cybersecurity Company ID.me Is Becoming Government’s Digital Gatekeeper - Bloomberg</a> &mdash; Military veteran Blake Hall’s cybersecurity company has become the government’s digital gatekeeper. Its unproven estimate—$400 billion in pandemic unemployment fraud—is also very good for its business.</li><li><a title="ID.me CEO apologizes for misstatements on IRS facial recognition - Axios" rel="nofollow" href="https://www.axios.com/idme-ceo-apologizes-misstatements-irs-facial-recognition-88ce2ee2-9ae9-426c-b69e-c0b42ad82f61.html">ID.me CEO apologizes for misstatements on IRS facial recognition - Axios</a> &mdash; The CEO of ID.me apologized Wednesday for mischaracterizing the facial recognition system the company uses to verify people's identity.</li><li><a title="Homepage - Identity Woman" rel="nofollow" href="https://identitywoman.net/">Homepage - Identity Woman</a> &mdash; Shape your impact with[in]
Digital Identity</li><li><a title="Sovereign Identity Updates | Substack" rel="nofollow" href="https://newsletter.identosphere.net/">Sovereign Identity Updates | Substack</a></li><li><a title="The Domains of Identity: A Framework for Understanding Identity Systems in Contemporary Society (Anthem Impact): Young, Kaliya: 9781785274916: Amazon.com: Books" rel="nofollow" href="https://www.amazon.com/Domains-Identity-Understanding-Contemporary-Collection/dp/1785274910">The Domains of Identity: A Framework for Understanding Identity Systems in Contemporary Society (Anthem Impact): Young, Kaliya: 9781785274916: Amazon.com: Books</a> &mdash; The Domains of Identity” defines sixteen simple and comprehensive categories of interactions which cause personally identifiable information to be stored in databases. This research, which builds on the synthesis of over 900 academic articles, addresses the challenges of identity management that involve interactions of almost all people in almost all institutional/organizational contexts. Enumerating the sixteen domains and describing the characteristics of each domain clarifies which problems can arise and how they can be solved within each domain.

</li><li><a title="Anil John - Technical Director and Silicon Valley Innovation Program @ U.S. Department of Homeland Security - Crunchbase Person Profile" rel="nofollow" href="https://www.crunchbase.com/person/anil-john">Anil John - Technical Director and Silicon Valley Innovation Program @ U.S. Department of Homeland Security - Crunchbase Person Profile</a></li><li><a title="SVIP | Homeland Security" rel="nofollow" href="https://www.dhs.gov/science-and-technology/svip">SVIP | Homeland Security</a> &mdash; The Department of Homeland Security (DHS) Science and Technology Directorate (S&amp;T) Silicon Valley Innovation Program (SVIP) is keeping pace with the innovation community to tackle the hardest problems faced by DHS and the Homeland Security Enterprise. </li><li><a title="The Thoughtful Biometrics Workshop 2022 · Thoughtful Biometrics" rel="nofollow" href="https://thoughtfulbiometrics.org/">The Thoughtful Biometrics Workshop 2022 · Thoughtful Biometrics</a> &mdash; The Thoughtful Biometrics Workshop is creating a space to dialogue about critical emerging issues surrounding biometric and digital identity technologies.</li><li><a title="European Digital Identity | European Commission" rel="nofollow" href="https://ec.europa.eu/info/strategy/priorities-2019-2024/europe-fit-digital-age/european-digital-identity_en">European Digital Identity | European Commission</a> &mdash; The European Digital Identity will be available to EU citizens, residents, and businesses who want to identify themselves or provide confirmation of certain personal information. It can be used for both online and offline public and private services across the EU.

</li><li><a title="The Hymn of Acxiom - Transcription - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=F7P2ViCRObs">The Hymn of Acxiom - Transcription - YouTube</a></li><li><a title="The Hymn of Acxiom - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=QF-7WiLykGM">The Hymn of Acxiom - YouTube</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 89: Digital Identity</title>
  <link>https://www.reality2cast.com/89</link>
  <guid isPermaLink="false">c3fa3dae-e513-4c3c-b1f0-852c68709766</guid>
  <pubDate>Fri, 22 Oct 2021 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/c3fa3dae-e513-4c3c-b1f0-852c68709766.mp3" length="72326787" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls talk to Phil Windley about digital identity, picos, oauth, and big tech ecosystems.</itunes:subtitle>
  <itunes:duration>47:03</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>Katherine Druckman and Doc Searls talk to Phil Windley about digital identity, picos, oauth, and big tech ecosystems.
Reality 2.0 around the web:
Site/Blog/Newsletter (https://www.reality2cast.com)
FaceBook (https://www.facebook.com/reality2cast)
Twitter (https://twitter.com/reality2cast)
YouTube (https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q)
Mastodon (https://linuxrocks.online/@reality2cast) Special Guest: Phil Windley.
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Phil Windley about digital identity, picos, oauth, and big tech ecosystems.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Phil Windley.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Phil Windley&#39;s Technometria" rel="nofollow" href="https://www.windley.com/">Phil Windley's Technometria</a></li><li><a title="7 Laws of Identity – Kim Cameron&#39;s Identity Weblog" rel="nofollow" href="https://www.identityblog.com/?p=1065">7 Laws of Identity – Kim Cameron's Identity Weblog</a> &mdash; Here's the most beautiful take yet on the Seven Laws of Identity – put together by Karon and Katrika, who even saw how the Laws connect with the Perception of Ailatan.  In the past people have asked why I didn't do a Laws of Identity poster – this must be it.  Click to view full size.</li><li><a title="Rainbows End - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Rainbows_End">Rainbows End - Wikipedia</a> &mdash; Rainbows End is a 2006 science fiction novel by Vernor Vinge. It was awarded the 2007 Hugo Award for Best Novel.[1] The book is set in San Diego, California, in 2025, in a variation of the fictional world Vinge explored in his 2002 Hugo-winning novella "Fast Times at Fairmont High" and 2004's "Synthetic Serendipity". Vinge has tentative plans for a sequel,[2] picking up some of the loose threads left at the end of the novel. The many technological advances depicted in the novel suggest that the world is undergoing ever-increasing change, following the technological singularity, a recurring subject in Vinge's fiction and nonfiction writing.</li><li><a title="Ten Reasons to Use Picos for Your Next Decentralized Programming Project" rel="nofollow" href="https://www.windley.com/archives/2021/07/ten_reasons_to_use_picos_for_your_next_decentralized_programming_project.shtml">Ten Reasons to Use Picos for Your Next Decentralized Programming Project</a> &mdash; Picos are a programming model for building decentralized applications that provide significant benefits in the form of abstractions that reduce programmer effort. Here are ten eleven reasons you should use picos for your next decentralized application.</li><li><a title="Moore&#39;s law - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Moore%27s_law">Moore's law - Wikipedia</a> &mdash; Moore's law is the observation that the number of transistors in a dense integrated circuit (IC) doubles about every two years. Moore's law is an observation and projection of a historical trend. Rather than a law of physics, it is an empirical relationship linked to gains from experience in production.</li><li><a title="Doc Searls Weblog · Car design trends" rel="nofollow" href="https://blogs.harvard.edu/doc/2021/08/02/car-design-trends/">Doc Searls Weblog · Car design trends</a> &mdash; On Quora, here’s my answer to What are the worst design trends in modern cars?—updated by our family’s experience with a new Toyota that features even more indicators than the bunch above::::</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Phil Windley about digital identity, picos, oauth, and big tech ecosystems.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Phil Windley.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Phil Windley&#39;s Technometria" rel="nofollow" href="https://www.windley.com/">Phil Windley's Technometria</a></li><li><a title="7 Laws of Identity – Kim Cameron&#39;s Identity Weblog" rel="nofollow" href="https://www.identityblog.com/?p=1065">7 Laws of Identity – Kim Cameron's Identity Weblog</a> &mdash; Here's the most beautiful take yet on the Seven Laws of Identity – put together by Karon and Katrika, who even saw how the Laws connect with the Perception of Ailatan.  In the past people have asked why I didn't do a Laws of Identity poster – this must be it.  Click to view full size.</li><li><a title="Rainbows End - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Rainbows_End">Rainbows End - Wikipedia</a> &mdash; Rainbows End is a 2006 science fiction novel by Vernor Vinge. It was awarded the 2007 Hugo Award for Best Novel.[1] The book is set in San Diego, California, in 2025, in a variation of the fictional world Vinge explored in his 2002 Hugo-winning novella "Fast Times at Fairmont High" and 2004's "Synthetic Serendipity". Vinge has tentative plans for a sequel,[2] picking up some of the loose threads left at the end of the novel. The many technological advances depicted in the novel suggest that the world is undergoing ever-increasing change, following the technological singularity, a recurring subject in Vinge's fiction and nonfiction writing.</li><li><a title="Ten Reasons to Use Picos for Your Next Decentralized Programming Project" rel="nofollow" href="https://www.windley.com/archives/2021/07/ten_reasons_to_use_picos_for_your_next_decentralized_programming_project.shtml">Ten Reasons to Use Picos for Your Next Decentralized Programming Project</a> &mdash; Picos are a programming model for building decentralized applications that provide significant benefits in the form of abstractions that reduce programmer effort. Here are ten eleven reasons you should use picos for your next decentralized application.</li><li><a title="Moore&#39;s law - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Moore%27s_law">Moore's law - Wikipedia</a> &mdash; Moore's law is the observation that the number of transistors in a dense integrated circuit (IC) doubles about every two years. Moore's law is an observation and projection of a historical trend. Rather than a law of physics, it is an empirical relationship linked to gains from experience in production.</li><li><a title="Doc Searls Weblog · Car design trends" rel="nofollow" href="https://blogs.harvard.edu/doc/2021/08/02/car-design-trends/">Doc Searls Weblog · Car design trends</a> &mdash; On Quora, here’s my answer to What are the worst design trends in modern cars?—updated by our family’s experience with a new Toyota that features even more indicators than the bunch above::::</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 78: Human ID for Single Sign-On</title>
  <link>https://www.reality2cast.com/78</link>
  <guid isPermaLink="false">9a2cc708-d89f-42c7-8597-3733fcb3ae57</guid>
  <pubDate>Fri, 16 Jul 2021 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/9a2cc708-d89f-42c7-8597-3733fcb3ae57.mp3" length="73877128" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls talk to Bastian Purrer and Namik Muduroglu about Human ID, their open source anonymous single sign-on solution.</itunes:subtitle>
  <itunes:duration>50:49</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>Katherine Druckman and Doc Searls talk to Bastian Purrer and Namik Muduroglu about Human ID, their open source anonymous single sign-on solution.
Subscribe to our newsletter. (https://reality2cast.com/newsletter)
Reality 2.0 around the web:
Site/Blog/Newsletter (https://www.reality2cast.com)
FaceBook (https://www.facebook.com/reality2cast)
Twitter (https://twitter.com/reality2cast)
YouTube (https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q)
Mastodon (https://linuxrocks.online/@reality2cast) Special Guests: Bastian Purrer and Namik Muduroglu.
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, identity</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Bastian Purrer and Namik Muduroglu about Human ID, their open source anonymous single sign-on solution.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Bastian Purrer and Namik Muduroglu.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="humanID | One-Click Anonymous Login" rel="nofollow" href="https://human-id.org/">humanID | One-Click Anonymous Login</a> &mdash; humanID is an anonymous, bot-resistant authentication for safer online communities.

Non-profit and open source, the project was started in 2018 by the Foundation for New humanID. With the help of Mozilla and Harvard, we’re on a mission to #FixTheInternet.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Bastian Purrer and Namik Muduroglu about Human ID, their open source anonymous single sign-on solution.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Bastian Purrer and Namik Muduroglu.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="humanID | One-Click Anonymous Login" rel="nofollow" href="https://human-id.org/">humanID | One-Click Anonymous Login</a> &mdash; humanID is an anonymous, bot-resistant authentication for safer online communities.

Non-profit and open source, the project was started in 2018 by the Foundation for New humanID. With the help of Mozilla and Harvard, we’re on a mission to #FixTheInternet.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 61: The Future of Authenticating Your Data</title>
  <link>https://www.reality2cast.com/61</link>
  <guid isPermaLink="false">038c3b8f-19cb-4b7e-8683-fd90f21c8599</guid>
  <pubDate>Fri, 12 Mar 2021 07:00:00 -0500</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/038c3b8f-19cb-4b7e-8683-fd90f21c8599.mp3" length="58417315" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls talk to Dave Huseby about the authentic data economy, and the future of authentication.</itunes:subtitle>
  <itunes:duration>1:07:32</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>Katherine Druckman and Doc Searls talk to Dave Huseby about the authentic data economy, and the future of authentication.
Subscribe to our newsletter. (https://reality2cast.com/newsletter)
Reality 2.0 around the web:
Site/Blog/Newsletter (https://www.reality2cast.com)
FaceBook (https://www.facebook.com/reality2cast)
Twitter (https://twitter.com/reality2cast)
YouTube (https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q)
Mastodon (https://linuxrocks.online/@reality2cast) Special Guest: Dave Huseby.
</description>
  <itunes:keywords>technology, privacy, open source, security, identity, blockchain, cryptography, authentication, self-sovereign identity</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Dave Huseby about the authentic data economy, and the future of authentication.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Dave Huseby.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="The Authentic Data Economy. Universal Digital Trust at Global Scale | by dwh | Feb, 2021 | Medium" rel="nofollow" href="https://dwhuseby.medium.com/the-authentic-data-economy-9802da67e1fa">The Authentic Data Economy. Universal Digital Trust at Global Scale | by dwh | Feb, 2021 | Medium</a> &mdash; To this day — even with mass computerization — trust-based interactions stubbornly resist digitization and remain at human scale simply because of the way we keep and maintain authentic data records. Tasks such as opening a bank account, having a document notarized, or signing a contract typically involves an in-person meeting to present the authentic data records (e.g. government identification, proof of funds, etc) and to sign a “wet” signature. However, now that we live in a reality twisted by the DNA strands of the COVID-19 virus, how do we ever hope to get back to in-person business as usual and trust as usual? Even if we can vaccinate against the virus and restore normal human interaction, the need for a more lasting technological solution for establishing trust remotely and transmitting it over great distances still exists. This, I believe, is the last great problem in technology and solving it will create the next crop of billion-dollar companies and billionaire founders.</li><li><a title="IIW" rel="nofollow" href="https://internetidentityworkshop.com/">IIW</a> &mdash; The Internet Identity Workshop has been finding, probing and solving identity issues twice every year since 2005. We meet in the Computer History Museum in Mountain View, CA. Every IIW moves topics, code and projects downfield. Name an identity topic and it’s likely that more substantial discussion and work has been done at IIW than any other conference!</li><li><a title="Merkle tree - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Merkle_tree">Merkle tree - Wikipedia</a> &mdash; In cryptography and computer science, a hash tree or Merkle tree is a tree in which every leaf node is labelled with the cryptographic hash of a data block, and every non-leaf node is labelled with the cryptographic hash of the labels of its child nodes. Hash trees allow efficient and secure verification of the contents of large data structures. Hash trees are a generalization of hash lists and hash chains.</li><li><a title="A Declaration of the Independence of Cyberspace | Electronic Frontier Foundation" rel="nofollow" href="https://www.eff.org/cyberspace-independence">A Declaration of the Independence of Cyberspace | Electronic Frontier Foundation</a> &mdash; Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Dave Huseby about the authentic data economy, and the future of authentication.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Dave Huseby.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="The Authentic Data Economy. Universal Digital Trust at Global Scale | by dwh | Feb, 2021 | Medium" rel="nofollow" href="https://dwhuseby.medium.com/the-authentic-data-economy-9802da67e1fa">The Authentic Data Economy. Universal Digital Trust at Global Scale | by dwh | Feb, 2021 | Medium</a> &mdash; To this day — even with mass computerization — trust-based interactions stubbornly resist digitization and remain at human scale simply because of the way we keep and maintain authentic data records. Tasks such as opening a bank account, having a document notarized, or signing a contract typically involves an in-person meeting to present the authentic data records (e.g. government identification, proof of funds, etc) and to sign a “wet” signature. However, now that we live in a reality twisted by the DNA strands of the COVID-19 virus, how do we ever hope to get back to in-person business as usual and trust as usual? Even if we can vaccinate against the virus and restore normal human interaction, the need for a more lasting technological solution for establishing trust remotely and transmitting it over great distances still exists. This, I believe, is the last great problem in technology and solving it will create the next crop of billion-dollar companies and billionaire founders.</li><li><a title="IIW" rel="nofollow" href="https://internetidentityworkshop.com/">IIW</a> &mdash; The Internet Identity Workshop has been finding, probing and solving identity issues twice every year since 2005. We meet in the Computer History Museum in Mountain View, CA. Every IIW moves topics, code and projects downfield. Name an identity topic and it’s likely that more substantial discussion and work has been done at IIW than any other conference!</li><li><a title="Merkle tree - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Merkle_tree">Merkle tree - Wikipedia</a> &mdash; In cryptography and computer science, a hash tree or Merkle tree is a tree in which every leaf node is labelled with the cryptographic hash of a data block, and every non-leaf node is labelled with the cryptographic hash of the labels of its child nodes. Hash trees allow efficient and secure verification of the contents of large data structures. Hash trees are a generalization of hash lists and hash chains.</li><li><a title="A Declaration of the Independence of Cyberspace | Electronic Frontier Foundation" rel="nofollow" href="https://www.eff.org/cyberspace-independence">A Declaration of the Independence of Cyberspace | Electronic Frontier Foundation</a> &mdash; Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 35: Bruce Schneier on Truth, Reality, and Contact Tracing</title>
  <link>https://www.reality2cast.com/35</link>
  <guid isPermaLink="false">246859d5-3a8a-4989-8554-1c0cc25b379f</guid>
  <pubDate>Wed, 27 May 2020 08:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/246859d5-3a8a-4989-8554-1c0cc25b379f.mp3" length="42786586" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Doc Searls and Katherine Druckman talk to Bruce Schneier about Contact Tracing, Digital Identity, hacking, privacy, and regulation.</itunes:subtitle>
  <itunes:duration>51:02</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>Doc Searls and Katherine Druckman talk to Bruce Schneier (https://www.schneier.com/) about contact tracing, digital identity, hacking, privacy, and regulation.
Show notes:
0:00:25: Contact tracing apps
0:02:31: Contract tracing false positive and false negative
0:04:24: Contract tracing apps adoption rate
0:07:36: Katherine agrees apps should build more trust
0:11:44: The 2nd anniversary of the GDPR
0:13:31: Bruce talks about his RSA presentation about the notion of hacking
0:15:26: Katherine dove tails hacking into contact tracing
0:18:24: Hacking discipline around SSI (Self Sovereign Identity)
0:19:08: Should we need proof of immunity or carry an immunization card/immunity passport?
0:23:28: Do the people we entrust to regulate our tech even understand it?
0:29:10: Should we give the FBI digital forensic capabilities?
0:32:24: Katherine wonders if our cellphones are at all secure
0:36:33: Doc ponders the future of travel
0:38:18: Bruce predicts we're in the midst of a major system reset
0:46:49: The political divide between the way people digest information
0:49:36: Bruce: "Truth wins because it actually conforms to reality."
Links:
Bruce Schneier on COVID-19 Contact Tracing Apps (https://www.schneier.com/blog/archives/2020/05/me_on_covad-19_.html)
Contact-tracing apps are not a solution to the COVID-19 crisis (https://www.brookings.edu/techstream/inaccurate-and-insecure-why-contact-tracing-apps-could-be-a-disaster/) Special Guest: Bruce Schneier.
</description>
  <itunes:keywords>technology, privacy, open source, security, COVID-19, coronavirus, hacking, identity, contact tracing</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to <a href="https://www.schneier.com/" rel="nofollow">Bruce Schneier</a> about contact tracing, digital identity, hacking, privacy, and regulation.</p>

<p>Show notes:</p>

<p>0:00:25: Contact tracing apps<br>
0:02:31: Contract tracing false positive and false negative<br>
0:04:24: Contract tracing apps adoption rate<br>
0:07:36: Katherine agrees apps should build more trust<br>
0:11:44: The 2nd anniversary of the GDPR<br>
0:13:31: Bruce talks about his RSA presentation about the notion of hacking<br>
0:15:26: Katherine dove tails hacking into contact tracing<br>
0:18:24: Hacking discipline around SSI (Self Sovereign Identity)<br>
0:19:08: Should we need proof of immunity or carry an immunization card/immunity passport?<br>
0:23:28: Do the people we entrust to regulate our tech even understand it?<br>
0:29:10: Should we give the FBI digital forensic capabilities?<br>
0:32:24: Katherine wonders if our cellphones are at all secure<br>
0:36:33: Doc ponders the future of travel<br>
0:38:18: Bruce predicts we&#39;re in the midst of a major system reset<br>
0:46:49: The political divide between the way people digest information<br>
0:49:36: Bruce: &quot;Truth wins because it actually conforms to reality.&quot;</p>

<p>Links:<br>
<a href="https://www.schneier.com/blog/archives/2020/05/me_on_covad-19_.html" rel="nofollow">Bruce Schneier on COVID-19 Contact Tracing Apps</a><br>
<a href="https://www.brookings.edu/techstream/inaccurate-and-insecure-why-contact-tracing-apps-could-be-a-disaster/" rel="nofollow">Contact-tracing apps are not a solution to the COVID-19 crisis</a></p><p>Special Guest: Bruce Schneier.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to <a href="https://www.schneier.com/" rel="nofollow">Bruce Schneier</a> about contact tracing, digital identity, hacking, privacy, and regulation.</p>

<p>Show notes:</p>

<p>0:00:25: Contact tracing apps<br>
0:02:31: Contract tracing false positive and false negative<br>
0:04:24: Contract tracing apps adoption rate<br>
0:07:36: Katherine agrees apps should build more trust<br>
0:11:44: The 2nd anniversary of the GDPR<br>
0:13:31: Bruce talks about his RSA presentation about the notion of hacking<br>
0:15:26: Katherine dove tails hacking into contact tracing<br>
0:18:24: Hacking discipline around SSI (Self Sovereign Identity)<br>
0:19:08: Should we need proof of immunity or carry an immunization card/immunity passport?<br>
0:23:28: Do the people we entrust to regulate our tech even understand it?<br>
0:29:10: Should we give the FBI digital forensic capabilities?<br>
0:32:24: Katherine wonders if our cellphones are at all secure<br>
0:36:33: Doc ponders the future of travel<br>
0:38:18: Bruce predicts we&#39;re in the midst of a major system reset<br>
0:46:49: The political divide between the way people digest information<br>
0:49:36: Bruce: &quot;Truth wins because it actually conforms to reality.&quot;</p>

<p>Links:<br>
<a href="https://www.schneier.com/blog/archives/2020/05/me_on_covad-19_.html" rel="nofollow">Bruce Schneier on COVID-19 Contact Tracing Apps</a><br>
<a href="https://www.brookings.edu/techstream/inaccurate-and-insecure-why-contact-tracing-apps-could-be-a-disaster/" rel="nofollow">Contact-tracing apps are not a solution to the COVID-19 crisis</a></p><p>Special Guest: Bruce Schneier.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
