[ExI] Verification

Anders Sandberg anders at aleph.se
Fri Aug 9 02:58:42 UTC 2013


On 2013-08-09 02:01, David Lubkin wrote:
> S offers a business service. A signs up for the service in his 
> capacity as
> an elected or appointed officer of business or non-profit B. At a 
> later date,
> C contacts S and claims that A is no longer in that capacity, and that C
> or D is now B's agent. Either A cannot be reached or he denies that he 
> has
> been replaced.

There is likely a literature on this in computer security. I would start 
by looking through what Bruce Schneier writes in his recent book on 
trust, because this is essentially a trust management issue.

I think there is no general solution if dealing with the domain of 
people and human institutions; the best you can do is to define an 
explicit procedure your company use to determine who gets what (and then 
you better put some of your most devious friends to game it, to figure 
out how it can be hacked). Often the solution is to use trusted third 
parties (banks, government, etc) that makes it costly for A or C to fake 
things. As long as the cost or hassle is big enough, there will be 
little abuse.

In formal systems like computers you can of course have cryptographic 
protocols and procedures. Ownership of a resource might be determined by 
presenting a token that contains its own ownership transfer information: 
"This shows that X now owns the resource [signed C]. The previous 
contents were: "This shows that C now owns the resource [signed A]. The 
previous contents were: "This shows A owns the resource [signed 
S][Signed A]"[signed A]"[signed C] [signed X]" or something like that.


-- 
Dr Anders Sandberg
Future of Humanity Institute
Oxford Martin School
Oxford University




More information about the extropy-chat mailing list