Decentralized AI

Decentralized AI

Updated April 21, 2024

Maarten Ectors

Today on LinkedIn Maarten Ectors wrote a good article titled, "The Future of AI is Decentralised AI" (Thanks Maarten for writing it). It makes sense as he says, "...bringing AI and compute to the data, not the other way around. You bring models to the data and ask the data to be analysed and only the results are sent back over the network. Models and data are now so big that compute needs to happen at the edges where the raw data is generated. " All of which I agree in theory with.

YET THERE'S A BIG BUT. WHAT ABOUT RISK, CONSENT AND PRIVACY? There are a number of factors to consider in creating a decentralized AI system. It starts with risk.

Risk and Legal Identity

As the risk rises at the "edge", then my underlying premise is at some point, the AI system will require a legal identity. It will be required to verify the entity:

  • Which can then be automatically included in smart AI leveraged legal contracts
  • By other AI systems, people, bots, IoT devices, etc. coming into contact with the decentralized AI system at the edge
  • Then determine, where risk requires it, the "hive" the decentralized AI system might belong to. By "hive" I mean other AI systems, bots (both physical and digital), IoT devics, etc. which are all working together.
  • Thus mitigating the risk it's Malicious Decentralized AI system you're dealing with and not Decentralized AI System 1234

Today, on the planet, there isn't a legal identity framework for this. Skim this architecture which delivers the above, “Creating AI Systems/Bots Legal Identity Framework”.

The Decentralized AI Might Also Require Credentials

Depending on the risk, a decentralized AI system might also require credentials. Let's hypothetically assume its Decentralized AI System 1234 which is doing medical diagnostic work on Jane Doe. Thus, where required, the AI system will require medical credentials issued by a recognized medical authority somewhere on the planet.

Today, on the planet, there isn't the credential architecture which delivers this for both AI systems and humans. Skim this article, ?Verifiable Credentials For Humans and AI Systems/Bots”.

Consent & Privacy

The challenge with leveraging a decentralized AI system at the edge is protecting a human or another AI system, bot or IoT devices, data privacy. It requires:

  • Consent from the other party or parties involved (be they humans, AI systems, bots or IoT devices)
  • Storage of the consent to be referred to down the road if a legal issue arises
  • Enforcement of the consent at the technical data level

In the human architecture I've created I addressed the issues above. Skim, “Rethinking Human Legal Identity”. My goal was to transfer over much of the same design into the AI legal identity architecture.

I'm in discussions with a government on the planet to leverage all of the above, in conjunction with AI leveraged smart contracts to instantly create legal consent contracts addressing the above. So, let's use Jane Doe, who's coming into contact with decentralized AI system MedBot1, from AI/bot Manufacturer Inc., which Acme Health Inc, is leveraging to do local diagnosis, as an example.

  1. AI/Bot Manufacturer inc. instantly registers the identity of MedBot1 with the local new age CRVS. The CRVS writes a TODA file to MedBot1's sourve code containing MedBot1's legal identity plus a digital signature from the CRVS
  2. AI/Bot Manufacture Inc. automatically applies for a medical credential from a recognized medical certification agency. The medical certification agency instantly writes to MedBot1's legal identity, a TODA file containing it's medical certification plus a digital signature from the certification agency
  3. AI/Bot Manufacture Inc. then automatically enters into a smart, AI leveraged contract with Acme Health Inc.. This process involves:

  • AI/Bot manufacturer specifying MedBot1's legal identity
  • Acme Health Inc. instantly checking the digital signature from the CRVS on MedBot1 to confirm it's legal identity
  • Acme Health Inc. instantly checking the digital signature from the medical certification agency to confirm it's medical credentials
  • Agreeing to terms on which data MedBot1 can and can't collect, who it can and can't share data with, etc.
  • Acme Health Inc. then instantly writing MedBot1's identity into their new age EMS (Entity Management System) (skim this article to learn more - “Entity Management System").
  • Acme Health Inc. then instantly writes a TODA file to the entity's source code containing it's unique enterprise identifier, Acme Heath Inc.s digital signature, plus a capability file containing authorization rights allowed for MedBot1 working at the edge/perimeter

Now when MedBot1, the decentralized AI system comes into contact with Jane Doe, here's the processes that are used:

  1. Jane gives consent, via her LSSI device, to Acme Health Inc and MedBot1 to collect only specific data points about her. This is done via an AI smart contract which is automatically stored in Jane Doe's SOLICT.
  2. MedBot1 is constrained by the contract on what data points it can and can't collect, who it can and can't transmit the data to.
  3. It might or might not involve MedBot1 making a diagnosis, treating Jane right then, etc.. Any changes, like doing more diagnostics than originally agreed to or treating Jane, require on the fly legal consent agreements to be amended or created between Acme Health Inc. and Jane Doe.

To see the future madly coming at us a few years down the road, skim this article, ?“Nanobots, Microbots, Manufacturing, Risk, Legal Identity & Contracts”.

Also bear in mind Jane might do all the above directly with MedBot1 with no Acme Health Inc., medical doctors, etc. Yep - it's both scary and exciting.

To learn more about things like TODA, graphs, etc. I strongly suggest you skim the following:


Rapidly Emerging New Attack Vectors

As if the above isn't enough to digest, consider this curve produced by my friend Pat Scannell. HYPOTHETICALLY, IT MEANS EACH HOUR NEW ATTACK VECTORS CAN BE CREATED AGAINST NOT ONLY SAY MEDBOT1 BUT ALSO ALL THE ABOVE PROCESSES, GOVERNANCE, TECH, ETC.

My Underlying Premise?

Only the largest companies and governments on the planet have the resources, expertise and budgets to continually defend against these types of attacks by the extremely well-funded Evil Inc.'s of the planet i.e. the rest of us don't and will be repeatedly, successfully attacked, hacked, etc.

Thus in the architectures linked to above, I created a well funded, global, independent non-profit whose job it is to do 24x7x365 threat analysis against not only the tech used, but also the governance, business processes, and end users be they humans, AI systems or bots. It will continually issue rated threat assessments. A very high risk must be responded to by governments, enterprises, companies, people. AI systems and bots within hours. Thus, this brings current industry best practices to the world of legal identity.

Architectures Addressing The Above

My Message To Government & Industry Leaders

About Guy Huntington

I'm an identity trailblazing problem solver. My past clients include Boeing, Capital One and the Government of Alberta's Digital Citizen Identity & Authentication project. Many of my past projects were leading edge at the time in the identity/security space. I've spent the last eight years working my way through creating a new legal identity architecture and leveraging this to then rethink learning.

I've also done a lot in education as a volunteer over my lifetime.?This included chairing my school district's technology committee in the 90's - which resulted in wiring most of the schools with optic fiber, behind building a technology leveraged school, and past president of Skills Canada BC and Skills Canada.

I do short term consulting for Boards, C-suites and Governments, assisting them in readying themselves for the arrival of AI systems, bots and AI leveraged, smart digital identities of humans.

I've written LOTS about the change coming. Skim the?over 100 LinkedIn articles?I've written,?or my webpage?with lots of papers.

Quotes I REALLY LIKE!!!!!!:

  • We cannot solve our problems with the same thinking we used when we created them” – Albert Einstein
  • “Change is hard at first, messy in the middle and gorgeous at the end.” – Robin Sharma
  • “Change is the law of life. And those who look only to the past or present are certain to miss the future” – John F. Kennedy

Reference Links:

An Identity Day in The Life:

My Message To Government & Industry Leaders:

National Security:

Rethinking Legal Identity, Credentials & Learning:

Learning Vision:

Creativity:

AI Agents:

Architecture:

AI/Human Legal Identity/Learning Cost References

AI Leveraged, Smart Digital Identities of Humans:

CISO's:

Companies, C-Suites and Boards:

Legal Identity & TODA:

Enterprise Articles:

Rethinking Enterprise Architecture In The Age of AI:

LLC's & AI:

Challenges With AI:

New Security Model:

DAO:

Kids:

Sex:

Schools:

Biometrics:

Legal Identity:

Identity, Death, Laws & Processes:

Open Source:

Notaries:

Climate Change, Migration & Legal Identity:

"Human Migration, Physical and Digital Legal Identity - A Thought Paper

Fraud/Crime:

Behavioral Marketing:

AI Systems and Bots:

Contract Law:

Insurance:

Health:

AI/AR/VR Metaverse Type Environments:

SOLICT:

EMP/HEMP Data Centre Protection:

Climate:

A 100,000-Foot Level Summary Of Legal Human Identity

  • Each person when they’re born has their legal identity data plus their forensic biometrics (fingerprints, and later when they can keep their eyes open – their iris) entered into a new age CRVS system (Civil Registration Vital Statistics - birth, name/gender change, marriage/divorce and death registry) with data standards
  • The CRVS writes to an external database, per single person, the identity data plus their forensic biometrics called a SOLICT “Source of Legal Identity & Credential Truth).?The person now controls this
  • As well, the CRVS also writes to the SOLICT legal identity relationships e.g. child/parent, cryptographically linking the SOLICTs.?So Jane Doe and her son John will have cryptographic digitally signed links showing their parent/child.?The same methodology can be used for power of attorney/person, executor of estate/deceased, etc.
  • The SOLICT in turn then pushes out the information to four different types of LSSI Devices “Legal Self-Sovereign Identity”; physical ID card, digital legal identity app, biometrically tied physical wristband containing identity information or a chip inserted into each person
  • The person is now able, with their consent, to release legal identity information about themselves.?This ranges from being able to legally, anonymously prove they’re a human (and not a bot), above or below age of consent, Covid vaccinated, etc.?It also means they can, at their discretion, release portions of their identity like gender, first name, legal name, address, etc.
  • NOTE: All consents granted by the person are stored in their SOLICT
  • Consent management for each person will be managed by their PIAM “Personal Identity Access Management) system.?This is AI leveraged, allowing the person, at their discretion, to automatically create consent legal agreements on the fly
  • It works both locally and globally, physically and digitally anywhere on the planet
  • AI systems/bots are also registered, where risk requires it, in the new age CRVS system
  • Governance and continual threat assessment, is done by a new, global, independent, non-profit funded by a very small charge per CRVS event to a jurisdiction to a maximum yearly amount.

A 100,000-Foot Level Summary Of The Learning Vision:

  • When the learner is a toddler, with their parents’ consent, they’ll be assessed by a physical bot for their learning abilities.?This will include sight, sound, hearing and smell, as well as hand-eye coordination, how they work or don’t work with others, learning abilities, all leveraging biometric and behavioral data
  • All consents given on behalf of the learner or, later in the learner’s life by the learner themselves, are stored in the learner’s SOLICT “Source of Legal Identity & Credential Truth
  • This is fed into a DLT “Digital Learning Twin”, which is created and legally bound to the learner
  • The DLT the produces its first IEP “Individualized Education Plan”, for the learner
  • The parents take home with them a learning assistant bot to assist the learner, each day, in learning.?The bot updates the DLT, which in turn continually refines the learner’s IEP
  • All learning data from the learner is stored in their LDV “Learner Data Vault”
  • When the learner’s first day of school comes, the parents prove the learner and their identities and legal relationship with the learner, via their LSSI devices (Legal Self-Sovereign Identity)
  • With their consent, they approve how the learner’s identity information will be used not only within the school, but also in AI/AR/VR learning environments
  • As well, the parents give their consent for the learner’s DLT, IEP and learning assistant bot to be used, via their PIAM (Personal Identity Access Management) and the learner’s PIAM
  • The schools LMS “Learning Management System” instantly takes the legal consent agreements, plus the learner’s identity and learning information, and integrates this with the school’s learning systems
  • From the first day, each learner is delivered a customized learning program, continually updated by both human and AI system/bot learning specialists, as well as sensors, learning assessments, etc.
  • All learner data collected in the school, is stored in the learner’s LDV
  • If the learner enters any AI/AR/VR type learning environment, consent agreements are created instantly on the fly with the learner, school, school districts, learning specialists, etc.?
  • These specify how the learner will be identified, learning data use, storage, deletion, etc.
  • When the learner acquires learning credentials, these are digitally signed by the authoritative learning authority, and written to the learner’s SOLICT.
  • The SOLICT in turn pushes these out to the learner’s LSSI devices
  • The learner is now in control of their learning credentials
  • When the learner graduates, they’ll be able, with their consent, to offer use of their DLT, IEP and LDV to employers, post-secondary, etc.?This significantly reduces time and costs to train or help the learner learn
  • The learner continually leverages their DLT/IEP/LDV until their die i.e., it’s a lifelong learning system
  • IT’S TRANSFORMATIONAL OVER TIME, NOT OVERNIGHT



要查看或添加评论,请登录

Guy Huntington的更多文章

社区洞察

其他会员也浏览了