Metaverse, Identity, Data, Privacy, Consent & Security
copyright 123RF

Metaverse, Identity, Data, Privacy, Consent & Security

Updated April 21, 2024

The recent Facebook rebranding as Meta, detailed in this presentation, all sounds wonderful on the surface i.e., new services, ways of working locally/globally, games, worlds, learning, et al. Yet most people are blissfully unaware of the risks and legal requirements coming from working in in global metaverse i.e. legal identity, data, privacy, consent and security. It requires a global rethink - something that almost all jurisdictions on the planet won't like to do, since it crosses over all their existing control. That's what this article dives into.

Let's Start With Us in a Metaverse Environment

Go to 1:04:54 of Mark's presentation. They're talking about the whole meal deal i.e., having a full body, real life looking avatar, in a virtual environment. Some come with me only a few years down the road...

An exceeding life like avatar version of yourself (i.e., with accurate skin pores, with your facial expressions, way you move, using your voice, etc.) now exists in the metaverse. It's also "smart" i.e., it leverages AI to do things on your behalf. You'll want to leverage all this to do things like shopping for yourself, doing financial transactions, going to meetings on your behalf, and recording your smart avatars interactions with people such that you can view this later, etc. It can also enter into relationships with other physical people and metaverse entities i.e., smart avatars, AI and bot entities.

Criminals will love this. Why? They'll be able to successfully masquerade as you. They'll take the billions they're making today from identity fraud, apply this to the new emerging metaverse tech, and begin to rip off not only you, but more importantly, companies, enterprises and governments by masquerading as you. YIKES!

Let's temporarily park this and then come back to it. Next, I want to talk about your data and privacy in a metaverse...

Metaverse Data, Privacy and Control

EACH SECOND IN A METAVERSE ENVIRONMENT YOU'RE GENERATING HEAPS OF VERY PERSONAL BIOMETRIC AND BEHAVIORAL DATA. The actual number of data points will include eye blinks per second, where you look, and in the not so distant future, neuroactivity. All of this data, will be stored in large vendor's databases, e.g. Facebook, Google, etc. and then used to accurately predict your behavior. Now come with me on a journey only a few years down the road...

Jane Doe has been using metaverse environments (AI/AR/VR et al) since she was a toddler. All of this rich data, every second, is stored in large global predictive behavioral companies databases. Her parents granted consent for this to happen, or Jane did herself, by clicking on the agree to consent buttons.

She's now a teenager and wants to apply for a job. The employer hypothetically could pay to a predictive behavioral company to predict Jane's behavior for the job Jane wants to do. Based on the results, the employer may or may not hire Jane for the job. Jane may or may not have been required to give her consent for the employer to search her on these types of commercial databases. YIKES!

Today, on the planet, we have a crappy consent system, mired within each local jurisdiction's laws, which isn't easily enforceable cross-jurisdictions. So, here's my next point - the metaverse, while wonderful on the surface, is one gigantic threat to our personal privacy. It requires whole new sets of laws, regulations et al, which are enforceable, cross-jurisdictions. Today, creating this seems like a daydream.

Then There's Bots To Consider in a Metaverse...

Skim this article “The Coming Classroom Revolution – Privacy & Internet of Things In A Classroom” – https://www.dhirubhai.net/pulse/coming-classroom-revolution-guy-huntington/It talks about John Doe, with his learning assistant bot "AssistBot", in a metaverse environment (AI/AR/VR), with students from around the planet, being taught by Sally GoodTeacher, who's located somewhere else on the planet, and assisted by two virtual teaching assistant bots, PattyBot and BobBot. All this is quickly becoming possible.

I ask readers this dumb question. "When the risks warrant it, how will the legal identities of all the participants in the metaverse learning environment be determined, their legal consents obtained on the fly as they enter these environments, and their privacy rights managed for the HEAPS of very personal learning data they're producing each second?" This includes students physical and avatar identities, Sally's identity and credentials as well as those of AssistBot, PattyBot and BobBot. Today, on the planet, there's isn't a architectural legal framework for this - YIKES!

Rate of Change and Security

Look at this curve. It shows a hockey stick shaped curve for tech change, which we can no longer cognitively keep up with. Let's return to the first point I made above re criminals masquerading as us in the metaverse environment. They'll take their billions, invest in the rapidly changing tech, and hypothetically, each new hour, create new attack vector attacks. They'll attack not only our metaverse identities, but also the governance, business processes et al.

I have an underlying premise. Except for only the largest companies and countries around the planet, who have the resources to continually defend, the rest become increasingly easy attack targets i.e., us, schools, companies, governments et al. YIKES!

So, I ask the dumb question, "How will we be secure from attacks, in the oddles of different metaverse environments we'll be creating and entering?"

Adding This Up...

The tech is madly screaming ahead of our old slow jurisdictionally based laws, in an age where we instantly cross over all borders around the planet. It requires:

  • A complete rethink of our legal identity framework, both physically and digitally for not only humans, but also AI systems and bots
  • A way for us to be in control of our oodles of multiverse identities, our data and our privacy
  • Requires ability to cross-enforce our rights across borders
  • Continuous threat analysis monitoring for our identity and learning within metaverse environments

It Requires Out of the Box Thinking...

For the last six years, I've been thinking and working away on an architecture which addresses all the above. Let's start with vision (using a learning focus).

Vision:

Skim these papers/articles:

Architecture:

Skim these three papers:

Costs to Design and Deploy

It Has National Security Implications

Skim “National Security – Reduce Risk By Instantly Determining Entity Friend From Foe

CISO Implications

Skim these two articles:

Transformational Change

We're entering a major paradigm shift where our old ways won't work well anymore. Thus, it requires out of the box thinking, for our out of the box times. That's what the architecture delivers.

Other Articles About Metaverses:

My Message To Government & Industry Leaders

About Guy Huntington

I'm an identity trailblazing problem solver. My past clients include Boeing, Capital One and the Government of Alberta's Digital Citizen Identity & Authentication project. Many of my past projects were leading edge at the time in the identity/security space. I've spent the last eight years working my way through creating a new legal identity architecture and leveraging this to then rethink learning.

I've also done a lot in education as a volunteer over my lifetime.?This included chairing my school district's technology committee in the 90's - which resulted in wiring most of the schools with optic fiber, behind building a technology leveraged school, and past president of Skills Canada BC and Skills Canada.

I do short term consulting for Boards, C-suites and Governments, assisting them in readying themselves for the arrival of AI systems, bots and AI leveraged, smart digital identities of humans.

I've written LOTS about the change coming. Skim the?over 100 LinkedIn articles?I've written,?or my webpage?with lots of papers.

Quotes I REALLY LIKE!!!!!!:

  • We cannot solve our problems with the same thinking we used when we created them” – Albert Einstein
  • “Change is hard at first, messy in the middle and gorgeous at the end.” – Robin Sharma
  • “Change is the law of life. And those who look only to the past or present are certain to miss the future” – John F. Kennedy

Reference Links:

An Identity Day in The Life:

My Message To Government & Industry Leaders:

National Security:

Rethinking Legal Identity, Credentials & Learning:

Learning Vision:

Creativity:

AI Agents:

Architecture:

AI/Human Legal Identity/Learning Cost References

AI Leveraged, Smart Digital Identities of Humans:

CISO's:

Companies, C-Suites and Boards:

Legal Identity & TODA:

Enterprise Articles:

Rethinking Enterprise Architecture In The Age of AI:

LLC's & AI:

Challenges With AI:

New Security Model:

DAO:

Kids:

Sex:

Schools:

Biometrics:

Legal Identity:

Identity, Death, Laws & Processes:

Open Source:

Notaries:

Climate Change, Migration & Legal Identity:

"Human Migration, Physical and Digital Legal Identity - A Thought Paper

Fraud/Crime:

Behavioral Marketing:

AI Systems and Bots:

Contract Law:

Insurance:

Health:

AI/AR/VR Metaverse Type Environments:

SOLICT:

EMP/HEMP Data Centre Protection:

Climate:

A 100,000-Foot Level Summary Of Legal Human Identity

  • Each person when they’re born has their legal identity data plus their forensic biometrics (fingerprints, and later when they can keep their eyes open – their iris) entered into a new age CRVS system (Civil Registration Vital Statistics - birth, name/gender change, marriage/divorce and death registry) with data standards
  • The CRVS writes to an external database, per single person, the identity data plus their forensic biometrics called a SOLICT “Source of Legal Identity & Credential Truth).?The person now controls this
  • As well, the CRVS also writes to the SOLICT legal identity relationships e.g. child/parent, cryptographically linking the SOLICTs.?So Jane Doe and her son John will have cryptographic digitally signed links showing their parent/child.?The same methodology can be used for power of attorney/person, executor of estate/deceased, etc.
  • The SOLICT in turn then pushes out the information to four different types of LSSI Devices “Legal Self-Sovereign Identity”; physical ID card, digital legal identity app, biometrically tied physical wristband containing identity information or a chip inserted into each person
  • The person is now able, with their consent, to release legal identity information about themselves.?This ranges from being able to legally, anonymously prove they’re a human (and not a bot), above or below age of consent, Covid vaccinated, etc.?It also means they can, at their discretion, release portions of their identity like gender, first name, legal name, address, etc.
  • NOTE: All consents granted by the person are stored in their SOLICT
  • Consent management for each person will be managed by their PIAM “Personal Identity Access Management) system.?This is AI leveraged, allowing the person, at their discretion, to automatically create consent legal agreements on the fly
  • It works both locally and globally, physically and digitally anywhere on the planet
  • AI systems/bots are also registered, where risk requires it, in the new age CRVS system
  • Governance and continual threat assessment, is done by a new, global, independent, non-profit funded by a very small charge per CRVS event to a jurisdiction to a maximum yearly amount.

A 100,000-Foot Level Summary Of The Learning Vision:

  • When the learner is a toddler, with their parents’ consent, they’ll be assessed by a physical bot for their learning abilities.?This will include sight, sound, hearing and smell, as well as hand-eye coordination, how they work or don’t work with others, learning abilities, all leveraging biometric and behavioral data
  • All consents given on behalf of the learner or, later in the learner’s life by the learner themselves, are stored in the learner’s SOLICT “Source of Legal Identity & Credential Truth
  • This is fed into a DLT “Digital Learning Twin”, which is created and legally bound to the learner
  • The DLT the produces its first IEP “Individualized Education Plan”, for the learner
  • The parents take home with them a learning assistant bot to assist the learner, each day, in learning.?The bot updates the DLT, which in turn continually refines the learner’s IEP
  • All learning data from the learner is stored in their LDV “Learner Data Vault”
  • When the learner’s first day of school comes, the parents prove the learner and their identities and legal relationship with the learner, via their LSSI devices (Legal Self-Sovereign Identity)
  • With their consent, they approve how the learner’s identity information will be used not only within the school, but also in AI/AR/VR learning environments
  • As well, the parents give their consent for the learner’s DLT, IEP and learning assistant bot to be used, via their PIAM (Personal Identity Access Management) and the learner’s PIAM
  • The schools LMS “Learning Management System” instantly takes the legal consent agreements, plus the learner’s identity and learning information, and integrates this with the school’s learning systems
  • From the first day, each learner is delivered a customized learning program, continually updated by both human and AI system/bot learning specialists, as well as sensors, learning assessments, etc.
  • All learner data collected in the school, is stored in the learner’s LDV
  • If the learner enters any AI/AR/VR type learning environment, consent agreements are created instantly on the fly with the learner, school, school districts, learning specialists, etc.?
  • These specify how the learner will be identified, learning data use, storage, deletion, etc.
  • When the learner acquires learning credentials, these are digitally signed by the authoritative learning authority, and written to the learner’s SOLICT.
  • The SOLICT in turn pushes these out to the learner’s LSSI devices
  • The learner is now in control of their learning credentials
  • When the learner graduates, they’ll be able, with their consent, to offer use of their DLT, IEP and LDV to employers, post-secondary, etc.?This significantly reduces time and costs to train or help the learner learn
  • The learner continually leverages their DLT/IEP/LDV until their die i.e., it’s a lifelong learning system
  • IT’S TRANSFORMATIONAL OVER TIME, NOT OVERNIGHT


?



Adrian Daniels

Outbound Sales and Growth | Podcast Host, Mentor and Producer ???

3 年

Great one Guy. Seems i'm not one of the only ones concerned about Metaverse

回复

要查看或添加评论,请登录

Guy Huntington的更多文章

社区洞察

其他会员也浏览了