From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-ej1-x630.google.com (mail-ej1-x630.google.com [IPv6:2a00:1450:4864:20::630]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by lists.bufferbloat.net (Postfix) with ESMTPS id D73063B2A4 for ; Wed, 3 Jan 2024 09:32:15 -0500 (EST) Received: by mail-ej1-x630.google.com with SMTP id a640c23a62f3a-a28b0207c1dso20945966b.3 for ; Wed, 03 Jan 2024 06:32:15 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1704292334; x=1704897134; darn=lists.bufferbloat.net; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :from:to:cc:subject:date:message-id:reply-to; bh=ko7uOtvCMNYxpQTFZOvZeVo1TCC4sZJYO1xq7IwOMPs=; b=RKrzvGuip7gnIUDBblAgqBQbR7eNcN1T89i968uJp6dQkBP3LF0OSmEveWak44g0tG zVvyUqqG7DmzlhX8ANnjBQ7T6yNmKzPbgs2PQ6EQZ+XMZfeyb46vP9Rkxss1kNdf8Ntx NVJ/y/daeDynHBKCvQkfp9jC5D8jmDhC/PjX6u2azQ+sWs2SC7cDnrz41tbgI7bhNsNl VXLi5vQg6xFx3oS8vmjCs1nitdBv5+duVncR/QUVZxHeek0mutBzxhzNiG2SJQO+HlYZ AZ2KmCTVYS8zi4YqCSAlTwYfmR2Frp2QT0PW+UqFMn20bHBHeAvgxwE5Xoy5eitE7Oej Blvw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1704292334; x=1704897134; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=ko7uOtvCMNYxpQTFZOvZeVo1TCC4sZJYO1xq7IwOMPs=; b=qwHfeUsEb+VTN2iy6ECptBHn9tngofqK7Yr3sRhKRzXXAuOVP+TPLMOeF31/3y6d06 jgWT6FkTEce65NBOS1yUyXo5HEh4ID7sBM791es/2jQYCDPl5+SiF0jNWkqtz04n8MLR llYXFMorKPcP8z3cwbBt8yJGe8ktfKgz9pUFG1rJ0TqjAvMUvuOevvHg0vPjCd2q0uLQ 1ZeGEmPllR893UFCsCXxqWzVgBl8vOeKBfzWmGeobA9f8gwBdNjCa9BQ2J8QvY1TMGMy 3ox4fe5BBmlr2TQ3YZoQkaYPJMRiHqYV8cv4WbD1Q3fEReFYTu1qJjmamQKMDcgGoOwc xCLg== X-Gm-Message-State: AOJu0Yygn7YcPX4duYMF0DbJE+DYIkIftje5EsZrMYbbwUT6gNFPDDsu gqJfg8OGaWLiZ98XnvvMMjD9buILcBefRhxl/Uz9PWK85r1sRQ== X-Google-Smtp-Source: AGHT+IFA+qyFBkAG+oZti18lmUP2qCwMHsn8fM2eCPcOzGrLkB8duJi3lA+8aPmL1TWjc889T1Xz88rOwdbjOBYFR0c= X-Received: by 2002:a17:906:7398:b0:a26:f5fc:d174 with SMTP id f24-20020a170906739800b00a26f5fcd174mr6059354ejl.49.1704292334155; Wed, 03 Jan 2024 06:32:14 -0800 (PST) MIME-Version: 1.0 References: In-Reply-To: From: "David Bray, PhD" Date: Wed, 3 Jan 2024 09:32:03 -0500 Message-ID: To: =?UTF-8?Q?Network_Neutrality_is_back=21_Let=C2=B4s_make_the_technical_asp?= =?UTF-8?Q?ects_heard_this_time=21?= Content-Type: multipart/alternative; boundary="0000000000002bbbf3060e0b7b72" Subject: [NNagain] The growing challenges of discerning authentic vs. inauthentic information and identity X-BeenThere: nnagain@lists.bufferbloat.net X-Mailman-Version: 2.1.20 Precedence: list List-Id: =?utf-8?q?Network_Neutrality_is_back!_Let=C2=B4s_make_the_technical_aspects_heard_this_time!?= List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 03 Jan 2024 14:32:16 -0000 --0000000000002bbbf3060e0b7b72 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Dear NNAgain=E2=80=99ers, Today on a different listserv, I joined a discussion on what I sense will be a pressing issue across multiple sectors in 2024. I recognize this is not NN-related and so if it isn=E2=80=99t of interest, I apologize in advan= ce. However as most of us have technology background here, my sense is we generally have a better sense of the looming issue than non-technical folks at the moment. Below I outline some of the contours of the evolving problem space, and invite each of you to share your thoughts as I sense the diversity of perspectives here might help with brainstorming potential solutions necessary for civil societies to continue: Premise: We are at the precipice of an extended era where inauthenticity vs. authenticity will be difficult to discern, that that involves multiple forms of content including biometrics and more. In isolated pockets, governments are becoming aware of this - however it=E2= =80=99s going to be really difficult for pluralistic societies like the U.S. where any of the Estates that traditionally would have a role to play in verifying the authentic vs. inauthentic nature of something have had public trust in them as arbiters eroding. And it doesn=E2=80=99t help that both po= litics and advertisement rely on presenting things as 100% authentic when they=E2= =80=99re often only somewhat so (or, to be more generous, mix facts with lots of beliefs). Not supporting autocracies, however they have a bit of a =E2=80=9Chome fiel= d=E2=80=9D advantage here because there is only one singular narrative - and anyone who questions it can be fired/isolated, imprisoned/disappeared, or killed/executed. Tools of such regimes, to include filtering, censorship, and repression - will be used to ensure only one narrative (authentic or not, mostly likely the latter) is seen by a majority of their population. Pluralistic societies will have it much harder, and the last ten years will pale in comparison to the challenges of sensemaking in a world flooded by both media and mediums of questionable authenticity. Back in 2019-2020, I did my darnest to connect Pablo and an additional People-Centered Internet expert with Salesforce that has a lot of CRM data with the proposal that SF could provide a feature where, as part of the CRM, =E2=80=9Cout of band=E2=80=9D questions could be included to do some s= ort of additional level of trust that the entity on the other end was who they claimed to be. Unfortunately that pitch was overshadowed by larger concerns that SF=E2=80=99s software, give some of its features, could be misused in = ways not intended by them (think about ways akin to Cambridge Analytica) and they were trying to figure out how they could incorporate features to prevent actors from misusing/abusing their software in ways not intended by them as a company. 2024 is going to be hard. Manipulation of what people appear to see, hear, sense - and thus know - is becoming sadly easier. Meanwhile understanding of the importance of triangulation, triangulation, triangulation from different perspective to discern authenticity vs. inauthenticity remains time-consuming and hard. Perhaps we need to consider standing up private sector Dun & Bradstreet-like entities for identity and other important adjudicatory functions - however that doesn=E2=80=99t immed= iately solve the issue of how to help the public in a would experiencing a flood of questionable content, information, and identities? And who =E2=80=9Cwatc= hes=E2=80=9D the adjudicators? *David Bray, PhD *Principal, LeadDoAdapt Ventures, Inc. Loomis Innovation Council Co-Chair & Distinguished Fellow Henry S. Stimson Center , Business Executives for National Security --0000000000002bbbf3060e0b7b72 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
Dear NNAgain=E2=80=99ers,=C2=A0

Today on a d= ifferent listserv, I joined a discussion on what I sense will be a pressing= issue across multiple sectors in 2024. I recognize this is not NN-related = and so if it isn=E2=80=99t of interest, I apologize in advance. However as = most of us have technology background here, my sense is we generally have a= better sense of the looming issue than non-technical folks at the moment. = Below I outline some of the contours of the evolving problem space, and inv= ite each of you to share your thoughts as I sense the diversity of perspect= ives here might help with brainstorming potential solutions necessary for c= ivil societies to continue:=C2=A0

Premise: We are at the precipice of an extended era where inauth= enticity vs. authenticity will be difficult to discern, that that involves = multiple forms of content including biometrics and more.=C2=A0

<= div dir=3D"auto" style=3D"font-family:-apple-system,"Helvetica Neue&qu= ot;;font-style:normal;font-variant-caps:normal;font-weight:400;letter-spaci= ng:normal;text-align:start;text-indent:0px;text-transform:none;white-space:= normal;word-spacing:1px;text-decoration:none;font-size:1rem;background-colo= r:rgba(0,0,0,0);border-color:rgb(117,117,117);color:rgb(117,117,117)">In is= olated pockets, governments are becoming aware of this - however it=E2=80= =99s going to be really difficult for pluralistic societies like the U.S. w= here any of the Estates that traditionally would have a role to play in ver= ifying the authentic vs. inauthentic nature of something have had public tr= ust in them as arbiters eroding. And it doesn=E2=80=99t help that both poli= tics and advertisement rely on presenting things as 100% authentic when the= y=E2=80=99re often only somewhat so (or, to be more generous, mix facts wit= h lots of beliefs).=C2=A0

Not supporting autocracies, however they h= ave a bit of a =E2=80=9Chome field=E2=80=9D advantage here because there is= only one singular narrative - and anyone who questions it can be fired/iso= lated, imprisoned/disappeared, or killed/executed. Tools of such regimes, t= o include filtering, censorship, and repression - will be used to ensure on= ly one narrative (authentic or not, mostly likely the latter) is seen by a = majority of their population. Pluralistic societies will have it much harde= r, and the last ten years will pale in comparison to the challenges of sens= emaking in a world flooded by both media and mediums of questionable authen= ticity.=C2=A0

Back in 2019-2020, I did my darnest to connect Pablo a= nd an additional People-Centered Internet expert with Salesforce that has a= lot of CRM data with the proposal that SF could provide a feature where, a= s part of the CRM, =E2=80=9Cout of band=E2=80=9D questions could be include= d to do some sort of additional level of trust that the entity on the other= end was who they claimed to be. Unfortunately that pitch was overshadowed = by larger concerns that SF=E2=80=99s software, give some of its features, c= ould be misused in ways not intended by them (think about ways akin to Camb= ridge Analytica) and they were trying to figure out how they could incorpor= ate features to prevent actors from misusing/abusing their software in ways= not intended by them as a company.=C2=A0

2024 is going to be hard. = Manipulation of what people appear to see, hear, sense - and thus know - is= becoming sadly easier.=C2=A0

Meanwhile understanding of the importa= nce of triangulation, triangulation, triangulation from different perspecti= ve to discern authenticity vs. inauthenticity remains time-consuming and ha= rd. Perhaps we need to consider standing up private sector Dun & Bradst= reet-like entities for identity and other important adjudicatory functions = - however that doesn=E2=80=99t immediately solve the issue of how to help t= he public in a would experiencing a flood of questionable content, informat= ion, and identities? And who =E2=80=9Cwatches=E2=80=9D the adjudicators?=C2= =A0

David Bray, PhD Principal, LeadDoAdapt Ventures, Inc.=C2=A0
--0000000000002bbbf3060e0b7b72--