Workflow
Authentication
icon
Search documents
Can We Build Technology We Actually Trust? | Nia Luckey | TEDxSugar Creek Women
TEDx Talksยท 2025-06-16 16:54
Core Argument - The core argument is that trust in technology and teams is not solely a technical issue but a deeply human one, requiring a new approach called the "trust protocol" [2][3][5] - The trust protocol is based on three pillars: authentication, encryption, and resilience, which are crucial for individual, team, and organizational performance [6] Trust Protocol Pillars - Authentication is about proving identity and showing up authentically, reliably, and dependably, which is essential for team performance and preventing system failures [7] - Encryption involves creating safe spaces where personal and professional boundaries are respected, allowing for open conversations about what is broken and how to fix it [10] - Resilience is about preparing for mistakes and bouncing back stronger, preserving trust through inevitable challenges [12] Implications and Examples - A single compromised password, as seen in the Colonial Pipeline attack of 2021, can lead to significant consequences due to broken authentication and a lack of trust in alerts [8] - Technology failures are often caused by a combination of human mistrust and misuse rather than bad coding, with 70% of failures attributed to this combination [11] - Fostering deeper human connections lays the groundwork for the future, step by step, choice by choice, driving progress forward [14][15]