Human Trust vs. Cyber Trust

09/22/11
  • Share This:

Between two humans, trust is based on personal interactions, with the ability to revoke said trust, and not necessarily with the subsumed trust of third parties. But in exchange for convenience, we have given up much of that personal trust in exchange for cyber trust, where computers decide who is trustworthy or not. How can we protect ourselves from a dubious party abusing a trust we never explicitly gave?
More from this series: Keeping Secrets

By:

Sign up for our free newsletter to see exclusive features and be the first to get news and updates on upcoming WSF programs.

FOR MORE ON THIS TOPIC, CHECK OUT:

cracking_cryptography
Date: Saturday June 4, 2011
Time: 03:00 PM-04:30 PM
Venue: NYU Kimmel Center, Eisner & Lubin Auditorium
Moderator: Josh Zepps
Participants: Brian Snow, Simon Singh, Orr Dunkelman, Tal Rabin

Since the earliest days of communication, clever minds have devised methods for enciphering messages to shield them from prying eyes. Today, cryptography has moved beyond the realm of dilettantes and soldiers to become a sophisticated scientific art—combining mathematics, physics, computer science, and electrical engineering. It not only protects messages, but it also safeguards our privacy. From email to banking transactions, modern cryptography is used everywhere. But does it really protect us? What took place was a discussion of cryptography’s far-reaching influence throughout history (from Julius Caesar’s reign...[Read more]

0 comments