Authentication
Search documents
X @Nick Szabo
Nick Szabo· 2026-03-08 15:20
Two-factor authentication is a service, so I find it more likely that he paid for it rather than sold it.Using phone numbers for authentication is tantamount to having a digital ID, and a digital ID gets you most of the way towards being doxed.If you have given your phone number or email address to X, in my opinion there's a good chance you have also unknowingly given it to an "ex"-8200 intelligence asset. The name you gave when you signed up for the phone number can be readily looked up unless you took spe ...
X @Ethereum
Ethereum· 2026-02-11 17:19
RT builders.garden 🌳 (@builders_garden)Introducing SIWA - Sign In With Agent 🔒Trustless identity and authentication for AI agents. One open standard. No API keys. No shared secrets.Built on ERC-8004 and ERC-8128https://t.co/0K92piPYLm https://t.co/eukm0wHWTR ...
X @Ethereum
Ethereum· 2026-02-11 00:11
RT Slice (@slice__so)ERC-8128: Signed HTTP Requests with Ethereum.A signature-based authentication standard that cryptographically binds identity and intent to every request.The missing primitive to securely verify humans, machines, and AI agents on the web, built on Ethereum. https://t.co/lqgNFgJhJC ...
X @Ethereum
Ethereum· 2026-02-10 23:29
RT Slice (@slice__so)ERC-8128: Signed HTTP Requests with Ethereum.A signature-based authentication standard that cryptographically binds identity and intent to every request.The missing primitive to securely verify humans, machines, and AI agents on the web, built on Ethereum. https://t.co/lqgNFgJhJC ...
X @BSCN
BSCN· 2026-01-31 10:37
🚨INSIGHT: PI NETWORK EXPLORES PALM PRINT VERIFICATION IN KYC@PiCoreTeam will explore palm print verification in KYC for additional authentication.According to the protocol's blog post, it will be testing palm print authentication as a beta feature to explore its potential use within its blockchain network."For Pioneers who already require multiple face liveness checks or identity re-checks, palm prints could potentially be used as part of broader authentication and security flows."The feature could also be ...
Identity for AI Agents - Patrick Riley & Carlos Galan, Auth0
AI Engineer· 2026-01-14 15:03
[music] We're talking today about identity for AI agents and how we authorize uh agents, MCP servers and uh the Um, we launched a new product uh actually this week. So, uh, that made this presentation fun. [laughter] Uh, had a major release just a few days ago um, for several of these features and ging these.Um, um, additionally, I should probably preface by saying a lot of this workshop material has been repurposed and um, our our architect uh, Abbyek, he goes by nicknames Shrek. um kind of prepared a lot ...
X @aixbt
aixbt· 2025-09-27 07:41
Protocol & Authentication Concerns - Story Protocol integrates Solo Leveling with 14 billion views and 175 million readers [1] - Authentication failure after Baby Shark verification, indicating inability to distinguish real IP from fake [1] - Platform undermines its own value proposition with a $2.67 billion fully diluted valuation (FDV) [1] - Broken authentication impacts revenue streams [1] Financial & Infrastructure Issues - Aria Protocol brings $100 million Korean music catalog [1] - Infrastructure approved fraudulent tokens and then deleted evidence [1]
X @Balaji
Balaji· 2025-08-17 18:16
In the medium run, states will need to replace the signature-checking step with a digital-signature-checking step.In practice, that could be as simple as having Texas state incorporate Google/Apple-style auth, and then require digital actions on deeds to be authenticated via passkeys and/or Yubikeys.This can be generalized. The state becomes a digital platform and any updates to official registries require the equivalent of a passkey to make that update. Existing mechanisms for passport/ID issuance could be ...
X @Wendy O
Wendy O· 2025-08-05 13:32
Technology & Authenticity - AI is impacting historical narratives [1] - AI generated images and videos lack authentication methods [1] - The lack of authentication is similar to historical alterations in books [1]
What Terrifies OpenAI's Altman About Banking in the AI Era 1
Bloomberg Television· 2025-07-31 18:45
Fraud Risk & Authentication Weakness - Financial institutions still accepting voice prints for authentication to move large sums of money is a critical vulnerability [1] - AI has largely defeated current authentication methods, excluding passwords, raising concerns about an impending fraud crisis [2] - The industry has warned about the potential for malicious actors to exploit AI voice technology, even if the technology isn't publicly released [3] Impending Crisis & Societal Impact - Impending fraud crisis is expected due to the advancement of AI voice technology [2] - Ransom attacks using AI-generated voices of family members are becoming more compelling [3] - Society needs to adapt verification methods in response to increasingly realistic AI-generated audio and video [4] Mitigation & Adaptation - Individuals will need to change how they interact and verify identities, especially in voice and video calls [4] - Education is crucial to teach people how to authenticate and understand the potential impacts of fraud in this new environment [4]