0:00
/
0:00
Transcript

Identity Perfection

From the archives 2023-10

I have recently dedicated myself to finding my best friends all over the world. I’m starting off with 3200 current subscribers, 1400 X followers, 2700 personal contacts and 3000 prior subscribers. I have ideas about circles of trust and vector math gives me all of the affinity calculations I need. Now it’s all about the mechanics of product design and agent-assisted coding to get the damnable aparatus built. I believe I am engaging the best concepts of identity around, including … well all the stuff below and what I’ll document here. My most recent post is here:

Stoic Observations
The Stoic Circle
Trust One thing I’ve said many times is that trust is the fundamental currency of civilization. As time goes on it feels to me as if there are fewer and fewer entities and people that we can trust. I feel oftimes that I have been naive in my expectations of civilization. I say this even laughing derisively at NYC Mamdani voters who realize that they are …
Read more

Here’s the abstract generated. I haven’t listened to this entirely yet to correct boneheaded mistakes, but it is what it is. I’m not afraid of immutables. I would say that deliberative democracy is a possibly good outcome, but not necessarily the only good reason to have this.

In the context of our brutal and kinetic ways and means of separating tyrants from citizens in MN, VZ, NYC, CA and the Middle East, I’m offering a real framework that enables ‘We are the World’. I think millennials will buy it, as will we Old School seniors of GenX.


Chapter: Perfected Identity and the Future of Secure Participative Democracy

  • [00:00:00 ~ 00:04:51]
    Introduction: Exploring Identity Perfection and Its Societal Significance

This chapter opens with a reflective morning monologue that gradually transitions into a discussion of identity perfection, a concept with profound implications for identity theft prevention, election integrity, and participative democracy. The speaker emphasizes the significance of cultivating systems that allow individuals to authenticate themselves uniquely and securely in a complex digital world. Central to this discussion are key terms such as perfected identity, multi-factor authentication, zero-knowledge systems, and decentralized validation.

  • Identity perfection is introduced as a sophisticated method of individual identification that could help mitigate spam, fraud, and electoral malfeasance by anchoring personal identity to secure, verifiable credentials.

  • The speaker advocates for enhanced participative democracy, where citizens engage more frequently and thoughtfully in decision-making, facilitated by trustworthy identity verification.

  • The metaphor of “voting early and often“ is invoked not to encourage fraud, but to promote habitual, informed participation in democratic processes.

Bullet Points:

  • Importance of identity perfection in combating identity theft and securing elections.

  • Desire for more participative democracy with frequent citizen engagement.

  • Need for rigorous, observable standards for election processes.

  • Recognition that paper ballots remain essential as a permanent record, complemented by electronic reconciliation.

  • The concept of identity tokens that can uniquely identify individuals amongst billions of potential identities.


  • [00:04:51 ~ 00:11:33]
    The Architecture of Perfected Identity: Technology and Concepts

Delving deeper, the speaker outlines the theoretical and practical framework of perfected identity systems. The approach hinges on creating a high-entropy identification token (e.g., 64-bit or 24-character tokens) that can be used in multiple roles and contexts, inspired by existing models such as Amazon’s identity and roles system.

  • Individuals can generate multiple cryptographic keys—potentially hundreds over a lifetime—that serve different purposes with designated validity periods.

  • These keys enable discrete authorizations ranging from voting to contractual agreements.

  • The system integrates anonymous keys linked to primary identities, protected through zero-knowledge proofs, allowing privacy-preserving validations.

  • Authentication factors include something you have (physical tokens like YubiKeys), something you are(biometrics like fingerprints), something you know (secret questions or unique personal knowledge), and something you do (behavioral authentication).

Bullet Points:

  • Perfected identity involves multi-key cryptographic systems with role-based permissions.

  • Use of zero-knowledge systems to preserve anonymity while allowing verification.

  • Authentication combines physical tokens, biometrics, mnemonic secrets, and behavioral data.

  • The speaker’s personal experience with FBI-standard handprint scanners and YubiKey 2 hardware tokens validates feasibility.

  • Proposal for a network of trusted NGOs (e.g., Long Now Foundation, EFF) to act as independent identity validators.

  • Potential to build upon existing standards such as PGP, FIDO2, and IAM frameworks.


  • [00:11:33 ~ 00:17:36]
    Practical Identity Authentication: From Biometrics to Paper Keys

This section elaborates on practical authentication components and their real-world applications:

  • The speaker recounts personal experiences with biometric handprint scanning performed at a UPS office, linked to FBI standards, underscoring that highly secure identity verification already exists in certain sectors.

  • The use of secret personal knowledge is innovatively illustrated through “bad lyrics”—incorrectly remembered song lyrics unique to an individual—as a form of mnemonic secret.

  • Physical tokens, specifically YubiKeys, serve as a secure hardware-based authentication tool for sensitive operations like cryptocurrency management.

  • The speaker references the FIDO2 protocol as a current industry standard enabling secure, passwordless authentication.

  • Emphasis on balancing zero-knowledge proofs and brokered public key validation to enable recovery mechanisms without compromising privacy.

  • The necessity of independent third-party organizations with trusted reputations to oversee identity validation processes is stressed.

Bullet Points:

  • Biometrics (fingerprints, photographs) are a core facet of secure identification.

  • Unique personal knowledge (e.g., deliberately misremembered lyrics) can act as secure secrets.

  • Hardware tokens like YubiKey complement biometrics and knowledge factors.

  • Existing cryptographic protocols (PGP, FIDO2) provide a technological foundation.

  • Trustworthy NGOs and academic institutions are proposed as identity validation stewards.

  • Systems must allow recovery and update of identity credentials through secure, multi-factor methods.


  • [00:17:36 ~ 00:23:04]
    Integrating Perfected Identity into Election Systems

Here, the speaker connects perfected identity to voter identification and election integrity:

  • Current identification methods (e.g., Real ID, Global Entry cards) demonstrate the feasibility of secure, government-issued identity verification.

  • The speaker’s own multi-channel identity presence—spanning social media verification, email longevity, and financial accounts—exemplifies layered identity confirmation.

  • A modernized notary public system is proposed as a model for verifying identity, suggesting rigorous certification and traceability improvements.

  • The speaker recalls personal experience as a bank teller and cashier, highlighting past multi-factor human authentication protocols involving physical ID checks, credit card verification, and third-party validation (e.g., Telecheck systems).

  • This multi-layered authentication, combining human verification with technological tools, is presented as more robust than many current methods.

Bullet Points:

  • Government-issued IDs (Real ID, Global Entry) serve as strong identity anchors.

  • Multiple digital and physical identity proofs enhance trustworthiness.

  • Reforming the notary public system could provide scalable, trustworthy identity verification.

  • Historical bank check verification processes employed effective multi-factor authentication.

  • Human oversight combined with technology remains a gold standard for identity validation.


  • [00:23:04 ~ 00:27:52]
    Technological Infrastructure for Identity and Voting Integration

This section explores existing and potential infrastructure to support identity authentication for voting and other civic processes:

  • The speaker cites the example of Los Angeles County’s carpool lane transponder system, which uses near-field communication (NFC) devices capable of contactless identification at highway speeds.

  • Such technologies could be adapted for voter identification, enabling efficient, contactless verification tied to secure identity tokens.

  • The system could be linked to financial instruments like credit cards or bank accounts for seamless account maintenance.

  • Smartphones equipped with biometric sensors (e.g., facial recognition) and banking apps already serve as powerful platforms for secure authentication.

  • Companies like Plaid have developed standards for secure banking data access that could be leveraged for identity verification in voting.

  • The speaker acknowledges cybersecurity risks, noting that online banking and electronic voting systems are prime targets for hackers, highlighting the critical challenge of securing such systems.

  • The idea of generating voting tokens from perfected identities, with mechanisms for rapid revalidation prior to voting, is proposed to ensure up-to-date voter registration and authentication.

Bullet Points:

  • Existing NFC transponder technology demonstrates scalable contactless ID verification.

  • Linking identity systems with financial accounts enables automated upkeep and verification.

  • Smartphones provide multi-factor biometric authentication platforms.

  • Plaid and similar services offer secure data-sharing standards adaptable to voter ID.

  • Cybersecurity threats remain a major obstacle to fully electronic systems.

  • Proposal for dynamic voting tokens with fast revalidation to maintain registration integrity.

  • Emphasis on in-person voting supported by electronic identity verification to balance security and accessibility.


  • [00:27:52 ~ 00:30:07]
    Conclusion: Towards a Secure, Inclusive Voting Future

The speaker concludes by stressing the coexistence of new identity-based electronic voting aids with existing in-person procedures, preserving the integrity of the voting process while enabling increased participation.

  • The vision is a multi-layered, human-centric identity system grounded in proven authentication techniques, enhanced by cryptographic and biometric advancements.

  • This system would empower voters to engage frequently and confidently, fostering more informed democratic participation.

  • While technical challenges, especially cybersecurity risks, remain significant, the speaker expresses optimism that leveraging current standards and trusted institutions can overcome these obstacles.

  • The chapter closes with an acknowledgment of the need for further development and detailed planning to realize this vision.

Bullet Points:

  • Hybrid voting systems combining electronic identity verification with in-person balloting are optimal.

  • Perfected identity enables frequent, secure voter participation and strengthens democracy.

  • Existing technology and standards provide a foundation, but security must be prioritized.

  • Trusted third-party organizations essential for validation and oversight.

  • Further research and implementation planning are necessary for practical deployment.


Summary of Key Concepts and Takeaways

  • Perfected Identity: A robust, cryptographically secure identity system that enables individuals to authenticate themselves uniquely across multiple platforms and roles.

  • Multi-Factor Authentication: Combining biometrics, physical tokens, secret knowledge, and behavioral data to ensure secure identity verification.

  • Zero-Knowledge Proofs: Privacy-preserving methods that allow identity verification without revealing sensitive information.

  • Participative Democracy: Encouraging frequent, informed voting and civic engagement, supported by secure, verifiable identity systems.

  • Hybrid Voting Systems: Maintaining paper ballots and in-person voting while integrating electronic identity verification for efficiency and security.

  • Trusted Validators: NGOs, academic institutions, and reputable organizations play a critical role in overseeing identity validation.

  • Technological Infrastructure: Leveraging NFC, smartphones, cryptographic protocols, and financial data standards to build scalable, secure identity and voting systems.

  • Cybersecurity Challenges: Recognizing and addressing the risks inherent in electronic voting systems, particularly from hackers and state-level actors.

This chapter presents a visionary synthesis of technology, policy, and practical experience aimed at reinventing identity verification for a more secure, inclusive, and participatory democratic future.

Discussion about this video

User's avatar

Ready for more?