ChatGPT, AI, Identity & Privacy
Image by iuriimotov on Freepik

ChatGPT, AI, Identity & Privacy

Risk

The other day, I typed in my name, Guy Huntington, into ChatGPT. The only thing I got was information on a now deceased Guy Huntington. When I typed in more information about me, it apologized and gave me some information about myself which was inaccurate. This is a simple example of risk.

If it's low risk about Guy Huntington, then it really doesn't matter if the information is accurate or not, if my permission was granted to release information about myself or whatever. Yet, as the risk rises, all of a sudden I'm going to want to give my consent to use information about me, and I want others to know I've given my consent. Today, on the planet, this framework doesn't exist.

YET, IT'S MUCH MORE COMPLICATED THAN THIS. Come with me on a short mental journey...

AI Leveraged Digital Versions of Us

Skim this article, ?“AI Leveraged Smart Digital Identities of Us”. It lays out a major paradigm shift as AI is leveraged to do things on our behalf, with much of it at medium and high risk levels. How will people, businesses, governments, et al be able to legally know it's your digital identity? Today on the planet, this framework doesn't exist.

YET, IT'S MUCH MORE COMPLICATED THAN THIS.

Which AI System Are You Interacting With?

Let's say Jane Doe is using an AI system to assist her in writing a report, or creating a presentation, or doing a health assessment on her, etc. How does she know it's the AI system it claims to be? Today, on the planet, this legal identity framework for AI systems doesn't exist.

YET, IT'S MUCH MORE COMPLICATED THAN THIS.

AI Systems, Bots & Hives

In the not so distant future, Jane could be a doctor in a modern hospital. She might be leveraging an AI enabled, smart digital identity of her to manage several patients while she works with someone else, interacting with a variety of different:

  • AI systems doing diagnosis
  • IoT devices generating information about her patients
  • All of which belong to a "hive"

There's LOTS of personal, confidential information about her patients flowing between the "hive", her smart digital identity, and other hospital systems. IT'S HIGH RISK. Thus, the "hive" needs to be legally identified. YET, IT'S MUCH MORE COMPLICATED THAN THIS. Why?

Hive Membership

Membership of the hive might change slowly or, very quickly. IoT devices might be quickly leveraged into the hive. in the next 10-ish years, nanobots will come into existence to be leveraged in cell diagnosis and repair (skim this article). My points?

  • All these different "entities" require legal identities
  • As importantly, is legally mapping potentially fast changing entity relationships between all the different entities
  • TODAY ON THE PLANET, THIS FRAMEWORK DOESN'T EXIST

IT'S CRYING OUT FOR A RETHINK OF OUR ANTIQUATED LEGAL IDENTITY FRAMEWORKS AROUND THE PLANET

Which sadly almost no one is thinking about. Skim ?“AI & Governments”. IT'S VERY COMPLICATED AND POLITICAL. Why? Legal identity is frequently managed at local state/provincial levels. Thus, there are literally hundreds of jurisdictions around the planet to deal with.

The legal identity architecture I've created for AI systems, bots and humans allows for each jurisdiction to be in control, but work globally, instantly. Skim these docs:

YET, IT'S MUCH MORE COMPLICATED THAN THIS. Why?

Enforcement of Privacy is a Joke Today on the Planet

Why? THE CURRENT SUCCESS RATE OF PROSECUTING CYBERCRIME ON THE PLANET IS A PALTRY 0.05%. Criminals operate out of jurisdictions where they can't be easily prosecuted. So, while jurisdictions might huff and puff about creating new privacy and consent frameworks to protect us and our data from AI, it's not likely going to work well down at the enforcement level.

I've written about how trade agreements should be modified between partners allowing for cross-enforcement of legal identity and privacy laws and regulations.

YET, IT'S MUCH MORE COMPLICATED THAN THIS. Why?

Rate of Change Threatens Our Privacy

Look at this tech change diagram produced by my friend Pat Scannell. It shows a logarithmic rate of tech change, which we can no longer keep up with. If you watch this recent video, "The AI Dilemma" produced by "The Center for Humane Technology", they are talking about exponential on top of exponential change and an increasing ability to keep up with it.

Here's my main point - the rapid rate of change will increasingly render more useless the ability of our local laws and regulations to protect us. Which is why, in the legal identity architecture links above, it includes a new, global, well-funded, independent, non-profit.

It's job is to do 24x7x365 threat analysis against not only the tech used in legal identity for AI systems, bots and humans, BUT ALSO AGAINST THE GOVERNANCE, BUSINESS PROCESSES AND END USERS. It continually produces rated threat assessments. SO, A VERY HIGH THREAT MUST BE RESPONDED TO WITHIN HOURS BY GOVERNMENTS, COMPANIES, ENTERPRISES AND PEOPLE. This brings current industry best practices to the world of legal identity.

YET, IT'S MUCH MORE COMPLICATED THAN THIS. Why?

It Requires New Toolkits to Use

Skim this article, ?“TODA, EMS, Graphs – New Enterprise Architectural Tools For a New Age”. My point? Governments, companies and enterprises should be rethinking their internal architectures to get ready to deal with all the above i,e, new laws and regulations alone won't solve the problems.

YES IT'S DARNED COMPLICATED

I'm currently in discussions with a country to fund and deploy the architecture. Meanwhile, I do short-term C-suite consulting to get rapid transformation plans in place to prepare for the incoming tech tsunami waves. Contact me.

About Guy Huntington

I'm an identity trailblazing problem solver. My past clients include Boeing, Capital One and the Government of Alberta's Digital Citizen Identity & Authentication project. Many of my past projects were leading edge at the time in the identity/security space. I've spent the last eight years working my way through creating a new legal identity architecture and leveraging this to then rethink learning.

I've also done a lot in education as a volunteer over my lifetime.?This included chairing my school district's technology committee in the 90's - which resulted in wiring most of the schools with optic fiber, behind building a technology leveraged school, and past president of Skills Canada BC and Skills Canada.

I do short term consulting for Boards, C-suites and Governments, assisting them in readying themselves for the arrival of AI systems, bots and AI leveraged, smart digital identities of humans.

I've written LOTS about the change coming. Skim the?over 100 LinkedIn articles?I've written,?or my webpage?with lots of papers.

Quotes I REALLY LIKE!!!!!!:

  • We cannot solve our problems with the same thinking we used when we created them” – Albert Einstein
  • “Change is hard at first, messy in the middle and gorgeous at the end.” – Robin Sharma
  • “Change is the law of life. And those who look only to the past or present are certain to miss the future” – John F. Kennedy

Reference Links:

An Identity Day in The Life:

My Message To Government & Industry Leaders:

National Security:

Rethinking Legal Identity, Credentials & Learning:

Learning Vision:

Creativity:

AI Agents:

Architecture:

AI/Human Legal Identity/Learning Cost References

AI Leveraged, Smart Digital Identities of Humans:

CISO's:

Companies, C-Suites and Boards:

Legal Identity & TODA:

Enterprise Articles:

Rethinking Enterprise Architecture In The Age of AI:

LLC's & AI:

Challenges With AI:

New Security Model:

DAO:

Kids:

Sex:

Schools:

Biometrics:

Legal Identity:

Identity, Death, Laws & Processes:

Open Source:

Notaries:

Climate Change, Migration & Legal Identity:

"Human Migration, Physical and Digital Legal Identity - A Thought Paper

Fraud/Crime:

Behavioral Marketing:

AI Systems and Bots:

Contract Law:

Insurance:

Health:

AI/AR/VR Metaverse Type Environments:

SOLICT:

EMP/HEMP Data Centre Protection:

Climate:

A 100,000-Foot Level Summary Of Legal Human Identity

  • Each person when they’re born has their legal identity data plus their forensic biometrics (fingerprints, and later when they can keep their eyes open – their iris) entered into a new age CRVS system (Civil Registration Vital Statistics - birth, name/gender change, marriage/divorce and death registry) with data standards
  • The CRVS writes to an external database, per single person, the identity data plus their forensic biometrics called a SOLICT “Source of Legal Identity & Credential Truth).?The person now controls this
  • As well, the CRVS also writes to the SOLICT legal identity relationships e.g. child/parent, cryptographically linking the SOLICTs.?So Jane Doe and her son John will have cryptographic digitally signed links showing their parent/child.?The same methodology can be used for power of attorney/person, executor of estate/deceased, etc.
  • The SOLICT in turn then pushes out the information to four different types of LSSI Devices “Legal Self-Sovereign Identity”; physical ID card, digital legal identity app, biometrically tied physical wristband containing identity information or a chip inserted into each person
  • The person is now able, with their consent, to release legal identity information about themselves.?This ranges from being able to legally, anonymously prove they’re a human (and not a bot), above or below age of consent, Covid vaccinated, etc.?It also means they can, at their discretion, release portions of their identity like gender, first name, legal name, address, etc.
  • NOTE: All consents granted by the person are stored in their SOLICT
  • Consent management for each person will be managed by their PIAM “Personal Identity Access Management) system.?This is AI leveraged, allowing the person, at their discretion, to automatically create consent legal agreements on the fly
  • It works both locally and globally, physically and digitally anywhere on the planet
  • AI systems/bots are also registered, where risk requires it, in the new age CRVS system
  • Governance and continual threat assessment, is done by a new, global, independent, non-profit funded by a very small charge per CRVS event to a jurisdiction to a maximum yearly amount.

A 100,000-Foot Level Summary Of The Learning Vision:

  • When the learner is a toddler, with their parents’ consent, they’ll be assessed by a physical bot for their learning abilities.?This will include sight, sound, hearing and smell, as well as hand-eye coordination, how they work or don’t work with others, learning abilities, all leveraging biometric and behavioral data
  • All consents given on behalf of the learner or, later in the learner’s life by the learner themselves, are stored in the learner’s SOLICT “Source of Legal Identity & Credential Truth
  • This is fed into a DLT “Digital Learning Twin”, which is created and legally bound to the learner
  • The DLT the produces its first IEP “Individualized Education Plan”, for the learner
  • The parents take home with them a learning assistant bot to assist the learner, each day, in learning.?The bot updates the DLT, which in turn continually refines the learner’s IEP
  • All learning data from the learner is stored in their LDV “Learner Data Vault”
  • When the learner’s first day of school comes, the parents prove the learner and their identities and legal relationship with the learner, via their LSSI devices (Legal Self-Sovereign Identity)
  • With their consent, they approve how the learner’s identity information will be used not only within the school, but also in AI/AR/VR learning environments
  • As well, the parents give their consent for the learner’s DLT, IEP and learning assistant bot to be used, via their PIAM (Personal Identity Access Management) and the learner’s PIAM
  • The schools LMS “Learning Management System” instantly takes the legal consent agreements, plus the learner’s identity and learning information, and integrates this with the school’s learning systems
  • From the first day, each learner is delivered a customized learning program, continually updated by both human and AI system/bot learning specialists, as well as sensors, learning assessments, etc.
  • All learner data collected in the school, is stored in the learner’s LDV
  • If the learner enters any AI/AR/VR type learning environment, consent agreements are created instantly on the fly with the learner, school, school districts, learning specialists, etc.?
  • These specify how the learner will be identified, learning data use, storage, deletion, etc.
  • When the learner acquires learning credentials, these are digitally signed by the authoritative learning authority, and written to the learner’s SOLICT.
  • The SOLICT in turn pushes these out to the learner’s LSSI devices
  • The learner is now in control of their learning credentials
  • When the learner graduates, they’ll be able, with their consent, to offer use of their DLT, IEP and LDV to employers, post-secondary, etc.?This significantly reduces time and costs to train or help the learner learn
  • The learner continually leverages their DLT/IEP/LDV until their die i.e., it’s a lifelong learning system
  • IT’S TRANSFORMATIONAL OVER TIME, NOT OVERNIGHT



Anik Chawla

Digital Product Innovation & Strategy | Security and Identity

1 年

Guy Huntington enjoying skimming through your articles - with respect to the intersection of ChatGPT and AI with privacy and DI - you might want to consider adding more specifics around how AutoGPT adds to the mix. ChatGPT had some restrictions built in related to internet access and web services / APIs - whereas AutoGPT now paves the way for deeper levels of automated data connectivity and enablement. If AutoGPT got access to quantum for instance, we'd pretty much have to say bye bye to a lot of existing "security".

要查看或添加评论,请登录

社区洞察

其他会员也浏览了