Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
Reality 2.0 - Episode 61: The Future of Authenticating Your Data

Episode 61: The Future of Authenticating Your Data

03/12/21 • 67 min

Reality 2.0

Katherine Druckman and Doc Searls talk to Dave Huseby about the authentic data economy, and the future of authentication.

Subscribe to our newsletter.

Reality 2.0 around the web:
Site/Blog/Newsletter
FaceBook
Twitter
YouTube
Mastodon

Special Guest: Dave Huseby.

Support Reality 2.0

Links:

  • The Authentic Data Economy. Universal Digital Trust at Global Scale | by dwh | Feb, 2021 | Medium — To this day — even with mass computerization — trust-based interactions stubbornly resist digitization and remain at human scale simply because of the way we keep and maintain authentic data records. Tasks such as opening a bank account, having a document notarized, or signing a contract typically involves an in-person meeting to present the authentic data records (e.g. government identification, proof of funds, etc) and to sign a “wet” signature. However, now that we live in a reality twisted by the DNA strands of the COVID-19 virus, how do we ever hope to get back to in-person business as usual and trust as usual? Even if we can vaccinate against the virus and restore normal human interaction, the need for a more lasting technological solution for establishing trust remotely and transmitting it over great distances still exists. This, I believe, is the last great problem in technology and solving it will create the next crop of billion-dollar companies and billionaire founders.
  • IIW — The Internet Identity Workshop has been finding, probing and solving identity issues twice every year since 2005. We meet in the Computer History Museum in Mountain View, CA. Every IIW moves topics, code and projects downfield. Name an identity topic and it’s likely that more substantial discussion and work has been done at IIW than any other conference!
  • Merkle tree - Wikipedia — In cryptography and computer science, a hash tree or Merkle tree is a tree in which every leaf node is labelled with the cryptographic hash of a data block, and every non-leaf node is labelled with the cryptographic hash of the labels of its child nodes. Hash trees allow efficient and secure verification of the contents of large data structures. Hash trees are a generalization of hash lists and hash chains.
  • A Declaration of the Independence of Cyberspace | Electronic Frontier Foundation — Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather.
plus icon
bookmark

Katherine Druckman and Doc Searls talk to Dave Huseby about the authentic data economy, and the future of authentication.

Subscribe to our newsletter.

Reality 2.0 around the web:
Site/Blog/Newsletter
FaceBook
Twitter
YouTube
Mastodon

Special Guest: Dave Huseby.

Support Reality 2.0

Links:

  • The Authentic Data Economy. Universal Digital Trust at Global Scale | by dwh | Feb, 2021 | Medium — To this day — even with mass computerization — trust-based interactions stubbornly resist digitization and remain at human scale simply because of the way we keep and maintain authentic data records. Tasks such as opening a bank account, having a document notarized, or signing a contract typically involves an in-person meeting to present the authentic data records (e.g. government identification, proof of funds, etc) and to sign a “wet” signature. However, now that we live in a reality twisted by the DNA strands of the COVID-19 virus, how do we ever hope to get back to in-person business as usual and trust as usual? Even if we can vaccinate against the virus and restore normal human interaction, the need for a more lasting technological solution for establishing trust remotely and transmitting it over great distances still exists. This, I believe, is the last great problem in technology and solving it will create the next crop of billion-dollar companies and billionaire founders.
  • IIW — The Internet Identity Workshop has been finding, probing and solving identity issues twice every year since 2005. We meet in the Computer History Museum in Mountain View, CA. Every IIW moves topics, code and projects downfield. Name an identity topic and it’s likely that more substantial discussion and work has been done at IIW than any other conference!
  • Merkle tree - Wikipedia — In cryptography and computer science, a hash tree or Merkle tree is a tree in which every leaf node is labelled with the cryptographic hash of a data block, and every non-leaf node is labelled with the cryptographic hash of the labels of its child nodes. Hash trees allow efficient and secure verification of the contents of large data structures. Hash trees are a generalization of hash lists and hash chains.
  • A Declaration of the Independence of Cyberspace | Electronic Frontier Foundation — Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather.

Previous Episode

undefined - Episode 60: SpaceX, Starlink, and Mozilla State Partitioning

Episode 60: SpaceX, Starlink, and Mozilla State Partitioning

Katherine Druckman and Doc Searls talk about Starlink, SpaceX and Mozilla’s new state partitioning privacy feature in Firefox.

Subscribe to our newsletter.

Reality 2.0 around the web:
Site/Blog/Newsletter
FaceBook
Twitter
YouTube
Mastodon

Support Reality 2.0

Links:

  • Starlink: SpaceX's satellite internet project | Space — Starlink is the name of a satellite network that the private spaceflight company SpaceX is developing to provide low-cost internet to remote locations. While SpaceX eventually hopes to have as many as 12,000 satellites in this so-called megaconstellation, the size and scale of the project have flustered astronomers and amateur skywatchers, who fear that the bright, orbiting objects will interfere with observations of the universe.
  • Heavens-Above — Awesome site for space nerds.
  • How Starlink Is About To Disrupt The Telecommunications Sector — If the logo doesn’t ring a bell, put it on your radar. Starlink, the satellite telecommunications company created by Elon Musk leveraging SpaceX’s rocket development, continues to complete milestones on schedule and announces that it will offer 300Mbps connectivity services with an approximate latency of 20ms by the end of this year. In the United States, where the company has garnered a favorable deal that includes $900 million in funding under FCC programs aimed at providing connectivity to rural areas, that’s a very competitive offer, so much so that many ISPs have protested to the FCC claiming that the technology used by the company is experimental, not sufficiently tested, and will cause problems in the future. If you don’t spot that as a clear sign of disruption, you haven’t seen enough disruptions yet.
  • Introducing State Partitioning - Mozilla Hacks - the Web developer blog — State Partitioning is the technical term for a new privacy feature in Firefox called Total Cookie Protection, which will be available in ETP Strict Mode in Firefox 86. This article shows how State Partitioning works inside of Firefox and explains what developers of third-party integrations can do to stay compatible with the latest changes.

Next Episode

undefined - Episode 62: How Did Disinformation Become the Truth?

Episode 62: How Did Disinformation Become the Truth?

Katherine Druckman and Doc Searls talk to Prof. Chris Bronk, Ph.D. and Petros Koutoupis about disinformation and cyber security, and how they impact our lives, as well as IoT vulnerabilities and voice recognition technology.

Subscribe to our newsletter.

Reality 2.0 around the web:
Site/Blog/Newsletter
FaceBook
Twitter
YouTube
Mastodon

Special Guests: Chris Bronk and Petros Koutoupis.

Support Reality 2.0

Links:

Episode Comments

Generate a badge

Get a badge for your website that links back to this episode

Select type & size
Open dropdown icon
share badge image

<a href="https://goodpods.com/podcasts/reality-20-328367/episode-61-the-future-of-authenticating-your-data-47908303"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to episode 61: the future of authenticating your data on goodpods" style="width: 225px" /> </a>

Copy