Sovereign “webs of trust” (weighted scores based on user configurable and sharable analyses of p2p interactions) user verification will always outperform centralized gate keeping … especially under state mandate to “protect our children”, where every other solution is hamstrung out of the gate by special interests and regulatory capture.
Phishing and social engineering attacks simply disappear when your only input comes from established trust networks.
