Identity and Personhood in Digital Democracy: Evaluating Inclusion,
Equality, Security, and Privacy in Pseudonym Parties and Other Proofs of
Personhood
- URL: http://arxiv.org/abs/2011.02412v1
- Date: Wed, 4 Nov 2020 17:08:54 GMT
- Title: Identity and Personhood in Digital Democracy: Evaluating Inclusion,
Equality, Security, and Privacy in Pseudonym Parties and Other Proofs of
Personhood
- Authors: Bryan Ford
- Abstract summary: ID checking, biometrics, self-sovereign identity, and trust networks all present flaws.
These flaws may be insurmountable because digital identity is a cart pulling the horse.
We explore alternative approaches to "proof of personhood" that may provide this missing foundation.
- Score: 1.3833241949666322
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Digital identity seems like a prerequisite for digital democracy: how can we
ensure "one person, one vote" online without identifying voters? But digital
identity solutions - ID checking, biometrics, self-sovereign identity, and
trust networks - all present flaws, leaving users vulnerable to exclusion,
identity loss or theft, and coercion. These flaws may be insurmountable because
digital identity is a cart pulling the horse. We cannot achieve digital
identity secure enough for the weight of digital democracy, until we build it
on a solid foundation of "digital personhood." While identity is about
distinguishing one person from another through attributes or affiliations,
personhood is about giving all real people inalienable digital participation
rights independent of identity, including protection against erosion of their
democratic rights through identity loss, theft, coercion, or fakery.
We explore and analyze alternative approaches to "proof of personhood" that
may provide this missing foundation. Pseudonym parties marry the transparency
of periodic physical-world events with the power of digital tokens between
events. These tokens represent limited-term but renewable claims usable for
purposes such as online voting or liquid democracy, sampled juries or
deliberative polls, abuse-resistant social communication, or minting universal
basic income in a permissionless cryptocurrency. Enhancing pseudonym parties to
provide participants a moment of enforced physical security and privacy can
address coercion and vote-buying risks that plague today's E-voting systems. We
also examine other proposed approaches to proof of personhood, some of which
offer conveniences such as all-online participation. These alternatives
currently fall short of satisfying all the key digital personhood goals,
unfortunately, but offer valuable insights into the challenges we face.
Related papers
- ID$^3$: Identity-Preserving-yet-Diversified Diffusion Models for Synthetic Face Recognition [60.15830516741776]
Synthetic face recognition (SFR) aims to generate datasets that mimic the distribution of real face data.
We introduce a diffusion-fueled SFR model termed $textID3$.
$textID3$ employs an ID-preserving loss to generate diverse yet identity-consistent facial appearances.
arXiv Detail & Related papers (2024-09-26T06:46:40Z) - ID-Guard: A Universal Framework for Combating Facial Manipulation via Breaking Identification [60.73617868629575]
misuse of deep learning-based facial manipulation poses a potential threat to civil rights.
To prevent this fraud at its source, proactive defense technology was proposed to disrupt the manipulation process.
We propose a novel universal framework for combating facial manipulation, called ID-Guard.
arXiv Detail & Related papers (2024-09-20T09:30:08Z) - Personhood credentials: Artificial intelligence and the value of privacy-preserving tools to distinguish who is real online [5.365346373228897]
Malicious actors have long used misleading identities to conduct fraud, spread disinformation, and carry out other deceptive schemes.
With the advent of increasingly capable AI, bad actors can amplify the potential scale and effectiveness of their operations.
We analyze the value of a new tool to address this challenge: "personhood credentials" (PHCs)
PHCs empower users to demonstrate that they are real people -- not AIs -- to online services, without disclosing any personal information.
arXiv Detail & Related papers (2024-08-15T02:41:25Z) - StableIdentity: Inserting Anybody into Anywhere at First Sight [57.99693188913382]
We propose StableIdentity, which allows identity-consistent recontextualization with just one face image.
We are the first to directly inject the identity learned from a single image into video/3D generation without finetuning.
arXiv Detail & Related papers (2024-01-29T09:06:15Z) - HFORD: High-Fidelity and Occlusion-Robust De-identification for Face
Privacy Protection [60.63915939982923]
Face de-identification is a practical way to solve the identity protection problem.
The existing facial de-identification methods have revealed several problems.
We present a High-Fidelity and Occlusion-Robust De-identification (HFORD) method to deal with these issues.
arXiv Detail & Related papers (2023-11-15T08:59:02Z) - AI and Democracy's Digital Identity Crisis [0.0]
Privacy-preserving identity attestations can drastically reduce instances of impersonation and make disinformation easy to identify and potentially hinder.
In this paper, we discuss attestation types, including governmental, biometric, federated, and web of trust-based.
We believe these systems could be the best approach to authenticating identity and protecting against some of the threats to democracy that AI can pose in the hands of malicious actors.
arXiv Detail & Related papers (2023-09-25T14:15:18Z) - Self-sovereign identity as a tool for digital democracy [0.0]
The importance of digital identity as a foundation for digital public services is considered.
Self-sovereign identities are proposed as replacement for the centralised model.
arXiv Detail & Related papers (2021-06-22T12:30:56Z) - Towards a trustful digital world: exploring self-sovereign identity
ecosystems [4.266530973611429]
Self-sovereign identity (SSI) solutions rely on distributed ledger technologies and verifiable credentials.
This paper builds on observations gathered in a field study to identify the building blocks, antecedents and possible outcomes of SSI ecosystems.
arXiv Detail & Related papers (2021-05-26T08:56:22Z) - Biometrics: Trust, but Verify [49.9641823975828]
Biometric recognition has exploded into a plethora of different applications around the globe.
There are a number of outstanding problems and concerns pertaining to the various sub-modules of biometric recognition systems.
arXiv Detail & Related papers (2021-05-14T03:07:25Z) - Unified Citizen Identity System Using Blockchain [0.0]
The citizenship identities of a nation's occupants enable the state to identify and authenticate them unquestionably.
There are problems in the traditional way of issuance f these identities and many hurdles that impede people from getting their benefits or exercising their rights.
arXiv Detail & Related papers (2021-01-17T15:14:18Z) - Towards Face Encryption by Generating Adversarial Identity Masks [53.82211571716117]
We propose a targeted identity-protection iterative method (TIP-IM) to generate adversarial identity masks.
TIP-IM provides 95%+ protection success rate against various state-of-the-art face recognition models.
arXiv Detail & Related papers (2020-03-15T12:45:10Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.