2min chapter

The MapScaping Podcast - GIS, Geospatial, Remote Sensing, earth observation and digital geography cover image

Navigating the World of Geospatial Standards

The MapScaping Podcast - GIS, Geospatial, Remote Sensing, earth observation and digital geography

CHAPTER

Is This a Way to Limit the Use Cases of Training Data?

The intent is it's, if we have a standardized approach to this and others will use, you get to make your own business rules around how you want to consume or distribute your training data. It almost sounds like we could look at some of the paradigms in NFTs and cryptocurrency and smart contracts when we think about making these kinds of standards. Yes. If you want to put restrictions on what it can and cannot be used for, you should be allowed to tag your data as such. And I think, yeah, there's some, some interesting applications there as we start talking about suitability of data as well as the history of processing of data.

00:00
Speaker 3
So in the case of the iCloud key chain, the past keys actually get backed up. So they are at some points, you know, the private keys are in memory. So the dress one was slightly different.
Speaker 2
But I thought that was their end to end encrypted iCloud keychain. So it's not any worse. And the encryption is happening in the secure enclave, even though they're stored on the cloud.
Speaker 1
I think that that might be true. If you're opted into that iCloud advanced data protection thing I was talking about earlier, but for 99% of users, that's not the case. And the thing that is actually really nice about it, not being the case is, you know, say you have a phone, you lose the phone or it gets stolen, you get a new one. Like if basically if you're able to like still use past keys after like, you know, losing your old device, not having any like written down backed up or anything like that and getting a new device, then that's like that shows conclusively that like Apple had access to it on their
Speaker 2
servers. Right. Although there is this advanced protection thing you mentioned, which in which case Apple throws away their keys, which is nicely paired with the recovery contacts feature. So you can add anyone who has an iCloud account who can recover your account to a device that was previously logged in as you as long as it's like an Apple device. So I guess probably best not to do one without the other. Yeah,
Speaker 1
I mean, so abstracting out of like this thing that we were just talking about though, I think if you look empirically at like, you know, people losing money in self custody on Ethereum, I think the vast majority of it so far is one like people like losing just like losing keys that they had like, oh, they like wrote down a seed phrase, but they lost it or they didn't write down a seed phrase and then like they lost the device that the wallet was on that kind of thing. And then on the other side, you know, like fishing and hacks and like people putting their seed phrases in places where it wouldn't be or shouldn't shouldn't be and things like that. So it's like, I think the vast majority of it is those two things. And I think that task keys actually do like a pretty excellent job of protecting you from those two majority risks. So it's like, if you have, you know, a passkey based wallet, there is no seed phrase for you to like accidentally put in the wrong place or for someone else to like find and take a picture of. And there's also nothing for you to like lose or forget.
Speaker 2
Right. I do think it's a great compromise for most people. I think it was Dan Romero from Farcaste or last week when, when Warpcast dropped their pass keys, large blob implementations saying that it's really the best answer for 99.9% of people based on his experience working at Coinbase for so many years and sort of perceiving all the troubles related to crypto and popular adoption. So I tend to agree with that perspective. So I wanted to ask you about P256, the R1 curve and verification on chain. What is maybe, maybe you could, we sort of, we've implied it already a little bit and obviously talked about it on other episodes of this show. But for people who haven't heard about it and don't know exactly what the story is, why do we want P256 verification on chain?
Speaker 3
Yeah, totally.

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode