How about a FOB/device that pairs with your devices over NFC so if you take a picture of something it’s signed at the point of capture. A wearable Key bunker thats cross compatible with different devices would be sick.

Reply to this note

Please Login to reply.

Discussion

Absolutely, love that idea. My only concern with that is, what’s to stop someone from generating an AI image and then signing that?

I suppose we’d have to rely on reputation at that point, which may honestly be the best bet, but the computer nerd in me wants a deterministic control 😅

Sure affirmative fraud is one thing, but they are then on the hook for the representation. More importantly you can disregard anything that is purportedly representing the non-signing agent in the piece of media and they can refute representations made in the media. If its a true piece of media generating by another they could request the agents contained in the media to sign off on the media to confirm its authenticity of course giving people the option to preserve their Fifth Amendment rights.

You guys are absolutely on the right track. Cryptography solves this, but we have to sew cryptography into the world very deeply and wrap it around everything. I've been thinking about how the rise of AI is actually our friend because the pervasive insecurity of it is a forcing function for cryptography adoption.

Cryptography is the art of securing information.

The QC hoax needs to be dispelled and ECC needs to be pervasive and ubiquitous. The rise of spintronics, which looks very realistic, and to a lesser extent, photonics, should help make that realistic from a hardware perspective

I’ll have to look into the last sentence items. But I’m bullish on weaving cryptography into meatspace.

Yeah, nobody is paying attention to the realistic non-startrek tech that is quietly coming down the pipe because we are too busy tying ourselves in knots over the CRQC psyop and injecting ourselves with the PQ vax. The real changes to computer hardware that are coming a super bullish for ECC and pervasive encryption

Close but we can simply link a protocol account to your phone and multiple other hw/people as 2fa, the endgame is a fluid mesh of multi-sig across any number of devices/peers with built-in inheritance and social recovery from the peers you've attested to 'trusting'