Image: Bionic Labs
Advertisement
Tkachev said that this "short, time-bound conversation" offers enough time for each Guardian to speak and naturally authenticate a user's identity, based on common interests, hobbies, memories, experiences, or even business deals. At the end of each call, Guardians have to make a simple choice, yes or no, to confirm whether they believe the person on the other end is the real user or someone else."The beauty of the process behind Bionic Identity is that your social circle (Circle of Trust) only gets stronger as you invite more individuals having different types of relationships and associations with you," Tkachev told me. "Today, it is quite common to 'trust' a small number of very close people (mother, father, wife, daughter, two or three friends), whereas with Bionic Identity we are redefining the notion of trust away from any particular individual whom you consider trustworthy today towards a distributed logic of a group of people."
Advertisement
Tkachev intends to make public the full details and logic behind Bionic Identity's encryption choices for peer review. The goal is to exceed encryption compliance requirements, and reduce reliance on storage of sensitive information, such as date-of-birth, mother's maiden name, social security number, and other typical ID authentication measures."[W]hen we do ask for full or partial access to an address book, we believe we should have the appropriate processes and systems in place to safeguard this information."
Advertisement