Creator of Molecule Protocol, Credit3, and Claimable.
Data Ownership — An Urgent Call to Reclaim Profits from Your Data
The Current State: Why It’s Urgent and Important to Reclaim Your Data Ownership in the AI EraYour data is in the hands of Big Tech. They profit billions from you, and your choice is either to use their services or be left out. They keep the majority of the cut—also known as the “take rate”—and you’re lucky if you get any of the pie. Moreover, your privacy is at their mercy. Why do such powerful Big Tech companies still experience breaches that irreversibly leak your social security, addresses...
The Contextual Knowledge Gap Theory (CKGT)
A Generative Framework for Closing Systemic Gaps in Learning, Work, Commerce, the Influencer Economy — and BeyondI. Introduction: Defining the Core SystemAt the heart of human inefficiency lies a systemic mismatch — not of access, but of alignment. We have more information than ever, yet the friction to apply it remains high. To understand why, we turn to systems thinking. In this view:Knowledge Gap is a stock — the accumulated deficit between what someone knows and what they need to know to ...
Data Ownership — An Urgent Call to Reclaim Profits from Your Data
The Current State: Why It’s Urgent and Important to Reclaim Your Data Ownership in the AI EraYour data is in the hands of Big Tech. They profit billions from you, and your choice is either to use their services or be left out. They keep the majority of the cut—also known as the “take rate”—and you’re lucky if you get any of the pie. Moreover, your privacy is at their mercy. Why do such powerful Big Tech companies still experience breaches that irreversibly leak your social security, addresses...
The Contextual Knowledge Gap Theory (CKGT)
A Generative Framework for Closing Systemic Gaps in Learning, Work, Commerce, the Influencer Economy — and BeyondI. Introduction: Defining the Core SystemAt the heart of human inefficiency lies a systemic mismatch — not of access, but of alignment. We have more information than ever, yet the friction to apply it remains high. To understand why, we turn to systems thinking. In this view:Knowledge Gap is a stock — the accumulated deficit between what someone knows and what they need to know to ...
Creator of Molecule Protocol, Credit3, and Claimable.

Subscribe to CP

Subscribe to CP
Share Dialog
Share Dialog
<100 subscribers
<100 subscribers
In today’s AMA on X.com, I was asked again about defending against deepfakes, particularly those posing as family members or colleagues to defraud unsuspecting people. While we may be unable to stop the creation of Taylor Swift deepfakes, we can build a defense against real-time or published content using blockchain technology.
In my “Due Diligence in Web3” talk at ETH Denver 2024, I addressed the disinformation age, where generated content blurs the line between reality and fiction. I proposed using blockchain to maintain the integrity of digital information by storing content on decentralized platforms and requiring digital signatures from creators and participants. This ensures that its authenticity remains intact even as content is widely shared. I urged the Web3 community to adopt this approach to protect the truth in what we see, read, and share online.
For example, when the New York Times publishes an article, instead of saving it on private servers, the content is stored on a decentralized storage like Arweave. The editor and participants sign the content, creating a unique Content ID and Proof of Authenticity, ensuring the content remains unaltered. This method provides a transparent and immutable chain of trust, addressing the challenges of DeepFakes and disinformation in the digital age.

We can extend this framework to social media and chat clients. Imagine a conference call or chat request that includes proof of identity using DID (Decentralized ID) to verify identities. DIDs can now be generated and managed by email alone, without complicated public/private key management. In the future, we might exchange DIDs instead of phone numbers or business cards, with verifiable credentials that include contact and personal information, such as birthdays. With ZKP (Zero-Knowledge Proof), we can selectively disclose information—like sharing your birthday without revealing the year—while updating or revoking access to our contacts as easily as managing our digital wallets.
This approach could also replace the traditional “blue checkmark” on social media. Instead of paying platforms like X.com or giving your identity to multiple big tech companies exploiting your profile for profit, you could use DID and verifiable credentials to prove your social media account ownership without sacrificing your privacy.
If you’re a developer interested in implementing or integrating this solution, feel free to contact me.
Reference:
Due Diligence in Web3 starts at 6:44.
In today’s AMA on X.com, I was asked again about defending against deepfakes, particularly those posing as family members or colleagues to defraud unsuspecting people. While we may be unable to stop the creation of Taylor Swift deepfakes, we can build a defense against real-time or published content using blockchain technology.
In my “Due Diligence in Web3” talk at ETH Denver 2024, I addressed the disinformation age, where generated content blurs the line between reality and fiction. I proposed using blockchain to maintain the integrity of digital information by storing content on decentralized platforms and requiring digital signatures from creators and participants. This ensures that its authenticity remains intact even as content is widely shared. I urged the Web3 community to adopt this approach to protect the truth in what we see, read, and share online.
For example, when the New York Times publishes an article, instead of saving it on private servers, the content is stored on a decentralized storage like Arweave. The editor and participants sign the content, creating a unique Content ID and Proof of Authenticity, ensuring the content remains unaltered. This method provides a transparent and immutable chain of trust, addressing the challenges of DeepFakes and disinformation in the digital age.

We can extend this framework to social media and chat clients. Imagine a conference call or chat request that includes proof of identity using DID (Decentralized ID) to verify identities. DIDs can now be generated and managed by email alone, without complicated public/private key management. In the future, we might exchange DIDs instead of phone numbers or business cards, with verifiable credentials that include contact and personal information, such as birthdays. With ZKP (Zero-Knowledge Proof), we can selectively disclose information—like sharing your birthday without revealing the year—while updating or revoking access to our contacts as easily as managing our digital wallets.
This approach could also replace the traditional “blue checkmark” on social media. Instead of paying platforms like X.com or giving your identity to multiple big tech companies exploiting your profile for profit, you could use DID and verifiable credentials to prove your social media account ownership without sacrificing your privacy.
If you’re a developer interested in implementing or integrating this solution, feel free to contact me.
Reference:
Due Diligence in Web3 starts at 6:44.
No activity yet