Episode 96
Absolute Privacy Through Cryptography
January 21st, 2022
1 hr 18 mins 28 secs
Tags
About this Episode
Doc Searls and Katherine Druckman talk to Dave Huseby about privacy, cryptography, and authentic data.
Reality 2.0 around the web:
Site/Blog/Newsletter
FaceBook
Twitter
YouTube
Mastodon
Episode Links
- Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems | The White House — This memorandum sets forth requirements for National Security Systems (NSS) that are equivalent to or exceed the cybersecurity requirements for Federal Information Systems set forth within Executive Order 14028 of May 12, 2021 (Improving the Nation’s Cybersecurity), and establishes methods to secure exceptions for circumstances necessitated by unique mission needs.
- Guess which government doesn't want you to use end-to-end encryption — From a privacy point of view, there is much to love about end-to-end encryption, as employed by the likes of WhatsApp. But while users may delight in the knowledge that their communication is free from surveillance, there are some groups that have a different opinion.
- I Got Access to My Secret Consumer Score. Now You Can Get Yours, Too. - The New York Times — Little-known companies are amassing your data — like food orders and Airbnb messages — and selling the analysis to clients. Here’s how to get a copy of what they have on you.
- Black Teen Kicked Out Of Roller Rink Over Face Recognition | News | BET — A face recognition-equipped Detroit roller rink reportedly kicked out a Black teen on June 10 after misidentifying her as a person who’d allegedly gotten into a fight there in March.
- The principles of user sovereignty | by 𝖉𝖜𝖍 | UX Collective — The first time I heard the phrase “user sovereignty” was while working at Mozilla on the Firefox web browser. Firefox ostensibly follows user sovereign design principles and respects its users. Mozilla has even baked it into their list of design principles on page 5 of the Firefox Design Values Booklet. But what does “user sovereignty” actually mean and what are the principles that define user-sovereign design?
- A Unified Theory of Decentralization | by 𝖉𝖜𝖍 | The Startup | Medium — All networks begin as only one thing; one neuron, one cell, one chip, one computer, or one user. One entity alone is not a network, but it is the starting point for understanding the unified theory of decentralization. One entity is fully sovereign, it has no connections to anything else that might influence or control it. One entity in isolation is empowered to act however it wants to strive for whatever results it seeks.
- The Web was Never Decentralized. Redecentralize the web is a fantasy | Design Warp — There are so many people today focused on “re-decentralizing the web.” They have a popular belief that when the web was invented it was a wonderfully optimistic vision of decentralization, governed by democratic principles and full of free information available through open access that all of humanity benefited from. They assume that originally all users of the web were well behaved and companies only wanted to help make the world better. Also, they think that somewhere along the line the web fell under the control of irresponsible corporations and governments and was contorted into the “broken and centralized” system that it is today.
- The Authentic Data Economy. Universal Digital Trust at Global Scale | by 𝖉𝖜𝖍 | Medium — All of us intuitively have a sense of what trust is and how to earn and maintain it as well as how to lose it. Trust never comes for free. The cost of earning trust is consistent trustworthy behavior over time. It forms our reputation in our social circles. But what happens when you have to do business outside of our personal social circles, such as with a new bank, or with a government agency far removed? How is trust established then? How is it transmitted to the distant institution to conduct business and how is it transmitted back? Over human history the solution has been to generate and keep official records about people and their activities. Some examples of official records are: Jane was born on this date, John earned his diploma from this university in this year, Judy received a license to practice medicine.
- Achieving Absolute Privacy. Cryptography Always Works, With or… | by 𝖉𝖜𝖍 | Medium — Absolute privacy on the internet is impossible, today. Why? Because nobody with the power to create it, wants it. The primary revenue model for the internet is based on surveillance making most investors aligned against privacy.
- Zero Architecture is the Way Forward | by 𝖉𝖜𝖍 | Medium — Inmy two most recent articles I discussed something called “Zero Architecture”. It is a new approach to designing decentralized systems using zero-trust security combined with business logic that operates entirely on zero-knowledge proofs — based on authentic data — and contains zero personally identifiable information. The primary motivation for this new way of thinking is building fully user-sovereign systems that automate regulatory compliance, drive out fraud, as well as eliminate surveillance capitalism and its attendant societal problems.
- 𝕿𝖍𝖊 𝕿𝖍𝖊𝖔𝖗𝖞 𝖔𝖋 𝕯𝖎𝖌𝖎𝖙𝖆𝖑 𝕲𝖆𝖙𝖊𝖘 | by 𝖉𝖜𝖍 | Medium — In computer systems it is common to construct digital gates around a service. The most common example is a username and password login gate that does a combination of authentication (i.e. verifying who is accessing the service) and authorization (i.e. what functions of the service can be executed). This approach for gating digital access is being blindly applied — without deeper contemplation — to vaccine passports and digital gates in the physical world with the explicit goal of denying people access to resources that were considered a human right as recently as this past spring. It is time to present a theoretical model describing the oppressive characteristics of naïve pervasive digital gating of real-world access and show why identity cannot be an input available to digital gates.