Skip to content

Attestation

Enhancing Digital Identity Verification

A Strategic Framework Against AI-Driven Identity Fraud

Abstract

The proliferation of AI-generated deepfakes has escalated threats of identity fraud in digital communications. This paper examines existing identity verification methods, introduces a strategic framework employing layered defenses to significantly increase attacker complexity, and proposes integrating cryptographic visual signatures alongside traditional verification methods. By analyzing attacker-defender dynamics using game theory, and referencing contemporary adversarial economics literature, we demonstrate the practical effectiveness of combining multiple verification modalities to deter identity fraud.

Blinky Light Thing: An Approach for Verifiable Real-Time Video

Zeroth Technology, Inc

  • James Canterbury
  • Patrick Macom
  • Ankur Garg

https://zeroth.technology

August 1st, 2024

Executive Summary

This white paper introduces the Blinky Light Thingy (BLT), a novel approach for real-time video authentication in live-streaming environments. The BLT embeds cryptographic messages into the physical environment being recorded, making it difficult to modify the video feed in real-time and avoiding the reliance on specialized trusted hardware. This approach addresses the growing challenge of distinguishing between authentic and generative content, particularly in the context of live video streams where it is becoming more common place for someone to "wear" the filter of another person and perpetuate fraud in what is typically considered a trusted environment. By utilizing Ethereum Attestation Services, a "do-it-yourself" hardware device, and open sourced encoding/decoding software, BLT provides a robust method for verifying both the identity of the presenter and the contemporaneousness (real-time nature) of the content.

Attested Sensors & Source Data Synthesis Under Zero Knowledge

TLDR; attested sensors can be used to digitally sign source data at the moment it is collected by a IOT device.  Blockchain can be used to notarize that signature and apply a tamper proof time stamp.  To protect sensitive data from leaving the source, a zero knowledge_  circuit can be used to produce a synthesis of the raw data and generate a proof that the synthesis was done correctly.