article thumbnail

The Generative Self-Sovereign Internet

Phil Windley

Summary: The self-sovereign internet, a secure overlay on the internet, provides the same capacity to produce change by numerous, unaffiliated and uncoordinated actors as the internet itself. This article explores the properties of the self-sovereign internet and makes the case that they justify its generativity claims.

Internet 135
article thumbnail

What will stop AI from flooding the internet with fake images?

Vox

Online misinformation has existed since the dawn of the internet, and crudely photoshopped images fooled people long before generative AI became mainstream. One report by Europol, the European Union’s law enforcement agency, predicted that as much as 90 percent of content on the internet could be created or edited by AI by 2026.

Internet 102
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to set up two-factor authentication on your online accounts

The Verge

Just about any account you own on the internet is prone to being hacked. But while those standards are still being adopted, the next best way to secure your accounts is two-factor authentication, or 2FA. But while those standards are still being adopted, the next best way to secure your accounts is two-factor authentication, or 2FA.

article thumbnail

Authentic Digital Relationships

Phil Windley

In his article Architecture Eats Culture Eats Strategy , Tim Bouma makes the point that the old management chestnut Culture Eats Strategy leaves open the question: how do we change the culture. I argue that this is the kind of thing the internet is best at. Supporting Authentic Relationships.

article thumbnail

Why you need a strong authentication platform

Network World

According to Symantec ’s annual Internet Security Threat Report , up to 80 percent of breaches could be eliminated with strong authentication. To read this article in full or to leave a comment, please click here

article thumbnail

India’s Supreme Court hears challenge to biometric authentication system

Network World

Two lawsuits being heard this week before India’s Supreme Court question a requirement imposed by the government that individuals should quote a biometrics-based authentication number when filing their tax returns. To read this article in full or to leave a comment, please click here

article thumbnail

Continuous Authentication: The future of Identity and Access Management (IAM)

Network World

Insert another authentication step on top of these credentials and this gateway becomes harder to infiltrate. But once access is gained, how can the device or Web application be certain that the authenticated user is, in fact, the same person throughout the entire session? Usernames and passwords act as a gateway.