Between two humans, trust is based on personal interactions, with the ability to revoke said trust, and not necessarily with the subsumed trust of third parties. But in exchange for convenience, we have given up much of that personal trust in exchange for cyber trust, where computers decide who is trustworthy or not. How can we protect ourselves from a dubious party abusing a trust we never explicitly gave?
More from this series: Keeping Secrets
Sign up for our free newsletter to see exclusive features and be the first to get news and updates on upcoming WSF programs.