Wednesday, August 8, 2012

Deep Integrity

"It  works because there is virtually no systemic formula. A grand secret is not necessary. Patterns at the highest levels are avoided as a matter of policy.

"Ideally, as much effort has to be expended to compromise a single identity as it took to assemble the population of identities plus a reasonable fraction of the time it took to do so."

Progress in this area has been dramatic in recent years. Identity authenticity has been a somewhat serendipitous result of the push to get the dramatic benefits of social interaction with our latest network and information technology.

"Voice out or text display: tell me something about yourself no one else is likely to know."

Transaction is held in an account until the automated system can assess an appropriate level of trust for  it. The organization(s) benefiting is at risk until sufficient trust is established to complete the exchange of value.

NOTE: Some of the foregoing in this BuzzTheHill post is not fictional. Consider its appearance here as a public disclosure and as such, to the degree something novel and not obvious to those skilled in the art has been discussed herein, the specific intent was/is to put it in the PUBLIC DOMAIN.

© 2012 Buzz Hill

No comments:

Post a Comment