
Episode 61: The Future of Authenticating Your Data
03/12/21 • 67 min
Katherine Druckman and Doc Searls talk to Dave Huseby about the authentic data economy, and the future of authentication.
Reality 2.0 around the web:
Site/Blog/Newsletter
FaceBook
Twitter
YouTube
Mastodon
Special Guest: Dave Huseby.
Links:
- The Authentic Data Economy. Universal Digital Trust at Global Scale | by dwh | Feb, 2021 | Medium — To this day — even with mass computerization — trust-based interactions stubbornly resist digitization and remain at human scale simply because of the way we keep and maintain authentic data records. Tasks such as opening a bank account, having a document notarized, or signing a contract typically involves an in-person meeting to present the authentic data records (e.g. government identification, proof of funds, etc) and to sign a “wet” signature. However, now that we live in a reality twisted by the DNA strands of the COVID-19 virus, how do we ever hope to get back to in-person business as usual and trust as usual? Even if we can vaccinate against the virus and restore normal human interaction, the need for a more lasting technological solution for establishing trust remotely and transmitting it over great distances still exists. This, I believe, is the last great problem in technology and solving it will create the next crop of billion-dollar companies and billionaire founders.
- IIW — The Internet Identity Workshop has been finding, probing and solving identity issues twice every year since 2005. We meet in the Computer History Museum in Mountain View, CA. Every IIW moves topics, code and projects downfield. Name an identity topic and it’s likely that more substantial discussion and work has been done at IIW than any other conference!
- Merkle tree - Wikipedia — In cryptography and computer science, a hash tree or Merkle tree is a tree in which every leaf node is labelled with the cryptographic hash of a data block, and every non-leaf node is labelled with the cryptographic hash of the labels of its child nodes. Hash trees allow efficient and secure verification of the contents of large data structures. Hash trees are a generalization of hash lists and hash chains.
- A Declaration of the Independence of Cyberspace | Electronic Frontier Foundation — Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather.
Katherine Druckman and Doc Searls talk to Dave Huseby about the authentic data economy, and the future of authentication.
Reality 2.0 around the web:
Site/Blog/Newsletter
FaceBook
Twitter
YouTube
Mastodon
Special Guest: Dave Huseby.
Links:
- The Authentic Data Economy. Universal Digital Trust at Global Scale | by dwh | Feb, 2021 | Medium — To this day — even with mass computerization — trust-based interactions stubbornly resist digitization and remain at human scale simply because of the way we keep and maintain authentic data records. Tasks such as opening a bank account, having a document notarized, or signing a contract typically involves an in-person meeting to present the authentic data records (e.g. government identification, proof of funds, etc) and to sign a “wet” signature. However, now that we live in a reality twisted by the DNA strands of the COVID-19 virus, how do we ever hope to get back to in-person business as usual and trust as usual? Even if we can vaccinate against the virus and restore normal human interaction, the need for a more lasting technological solution for establishing trust remotely and transmitting it over great distances still exists. This, I believe, is the last great problem in technology and solving it will create the next crop of billion-dollar companies and billionaire founders.
- IIW — The Internet Identity Workshop has been finding, probing and solving identity issues twice every year since 2005. We meet in the Computer History Museum in Mountain View, CA. Every IIW moves topics, code and projects downfield. Name an identity topic and it’s likely that more substantial discussion and work has been done at IIW than any other conference!
- Merkle tree - Wikipedia — In cryptography and computer science, a hash tree or Merkle tree is a tree in which every leaf node is labelled with the cryptographic hash of a data block, and every non-leaf node is labelled with the cryptographic hash of the labels of its child nodes. Hash trees allow efficient and secure verification of the contents of large data structures. Hash trees are a generalization of hash lists and hash chains.
- A Declaration of the Independence of Cyberspace | Electronic Frontier Foundation — Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather.
Previous Episode

Episode 60: SpaceX, Starlink, and Mozilla State Partitioning
Katherine Druckman and Doc Searls talk about Starlink, SpaceX and Mozilla’s new state partitioning privacy feature in Firefox.
Reality 2.0 around the web:
Site/Blog/Newsletter
FaceBook
Twitter
YouTube
Mastodon
Links:
- Starlink: SpaceX's satellite internet project | Space — Starlink is the name of a satellite network that the private spaceflight company SpaceX is developing to provide low-cost internet to remote locations. While SpaceX eventually hopes to have as many as 12,000 satellites in this so-called megaconstellation, the size and scale of the project have flustered astronomers and amateur skywatchers, who fear that the bright, orbiting objects will interfere with observations of the universe.
- Heavens-Above — Awesome site for space nerds.
- How Starlink Is About To Disrupt The Telecommunications Sector — If the logo doesn’t ring a bell, put it on your radar. Starlink, the satellite telecommunications company created by Elon Musk leveraging SpaceX’s rocket development, continues to complete milestones on schedule and announces that it will offer 300Mbps connectivity services with an approximate latency of 20ms by the end of this year. In the United States, where the company has garnered a favorable deal that includes $900 million in funding under FCC programs aimed at providing connectivity to rural areas, that’s a very competitive offer, so much so that many ISPs have protested to the FCC claiming that the technology used by the company is experimental, not sufficiently tested, and will cause problems in the future. If you don’t spot that as a clear sign of disruption, you haven’t seen enough disruptions yet.
- Introducing State Partitioning - Mozilla Hacks - the Web developer blog — State Partitioning is the technical term for a new privacy feature in Firefox called Total Cookie Protection, which will be available in ETP Strict Mode in Firefox 86. This article shows how State Partitioning works inside of Firefox and explains what developers of third-party integrations can do to stay compatible with the latest changes.
Next Episode

Episode 62: How Did Disinformation Become the Truth?
Katherine Druckman and Doc Searls talk to Prof. Chris Bronk, Ph.D. and Petros Koutoupis about disinformation and cyber security, and how they impact our lives, as well as IoT vulnerabilities and voice recognition technology.
Reality 2.0 around the web:
Site/Blog/Newsletter
FaceBook
Twitter
YouTube
Mastodon
Special Guests: Chris Bronk and Petros Koutoupis.
Links:
- “Misinformation” vs. “Disinformation”: Get Informed On The Difference - Dictionary.com — Disinformation means “false information, as about a country’s military strength or plans, disseminated by a government or intelligence agency in a hostile act of tactical political subversion.” It is also used more generally to mean “deliberately misleading or biased information; manipulated narrative or facts; propaganda.” So, disinformation is knowingly spreading misinformation. Our first definition of this word gives one major reason why a person or group might want to spread wrong information, but there are many other nefarious motivations lurking behind the creation of disinformation.
- Amazon.com: The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power (9781541758001): Zuboff, Shoshana: Books — In this masterwork of original thinking and research, Shoshana Zuboff provides startling insights into the phenomenon that she has named surveillance capitalism. The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the natural world in the twentieth.
- Tom Clancy, author of the Jack Ryan Novels - Tom Clancy
- Amazon.com : john le carré
- Amazon.com: Active Measures (9781250787408): Rid, Thomas: Books
- Internet-based chastity belts hijacked by malicious hackers | Boing Boing — Oh man. A bluetooth-controlled chastity belt was the recent victim of a hacker attack. The Cellmate Chastity Cage, made by Chinese company Qiui, was designed so that users are able to lock and unlock their sex partner's penis prison remotely. Users caught in the attack were threatened with having their genitals locked in permanently unless they paid a 0.02 bitcoin (about $270) ransom.
If you like this episode you’ll love
Episode Comments
Generate a badge
Get a badge for your website that links back to this episode
<a href="https://goodpods.com/podcasts/reality-20-328367/episode-61-the-future-of-authenticating-your-data-47908303"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to episode 61: the future of authenticating your data on goodpods" style="width: 225px" /> </a>
Copy